Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-29923 (GCVE-0-2021-29923)
Vulnerability from cvelistv5 – Published: 2021-08-07 16:38 – Updated: 2024-08-03 22:18- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:18:03.455Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/golang/go/issues/43389"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/golang/go/issues/30999"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"name": "FEDORA-2022-17d004ed71",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"name": "GLSA-202208-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-04T15:09:33",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/golang/go/issues/43389"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/golang/go/issues/30999"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"name": "FEDORA-2022-17d004ed71",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"name": "GLSA-202208-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29923",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://golang.org/pkg/net/#ParseCIDR",
"refsource": "MISC",
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis",
"refsource": "MISC",
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"name": "https://github.com/golang/go/issues/43389",
"refsource": "MISC",
"url": "https://github.com/golang/go/issues/43389"
},
{
"name": "https://github.com/golang/go/issues/30999",
"refsource": "MISC",
"url": "https://github.com/golang/go/issues/30999"
},
{
"name": "https://go-review.googlesource.com/c/go/+/325829/",
"refsource": "MISC",
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md",
"refsource": "MISC",
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"name": "FEDORA-2022-17d004ed71",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"name": "GLSA-202208-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29923",
"datePublished": "2021-08-07T16:38:59",
"dateReserved": "2021-04-01T00:00:00",
"dateUpdated": "2024-08-03T22:18:03.455Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.17\", \"matchCriteriaId\": \"D39D5C21-8281-429F-AC33-CE39821CA3EC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"21.1.1.1.0\", \"matchCriteriaId\": \"20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.\"}, {\"lang\": \"es\", \"value\": \"Go versiones anteriores a 1.17, no considera apropiadamente los caracteres cero extra\\u00f1os al principio de un octeto de direcci\\u00f3n IP, lo que (en algunas situaciones) permite a atacantes omitir el control de acceso que es basado en las direcciones IP, debido a una interpretaci\\u00f3n octal inesperada. Esto afecta a net.ParseIP y net.ParseCIDR\"}]",
"id": "CVE-2021-29923",
"lastModified": "2024-11-21T06:01:59.570",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-08-07T17:15:07.067",
"references": "[{\"url\": \"https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/golang/go/issues/30999\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/golang/go/issues/43389\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://go-review.googlesource.com/c/go/+/325829/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://golang.org/pkg/net/#ParseCIDR\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-02\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/golang/go/issues/30999\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/golang/go/issues/43389\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://go-review.googlesource.com/c/go/+/325829/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://golang.org/pkg/net/#ParseCIDR\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-02\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-29923\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-07T17:15:07.067\",\"lastModified\":\"2024-11-21T06:01:59.570\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.17, no considera apropiadamente los caracteres cero extra\u00f1os al principio de un octeto de direcci\u00f3n IP, lo que (en algunas situaciones) permite a atacantes omitir el control de acceso que es basado en las direcciones IP, debido a una interpretaci\u00f3n octal inesperada. Esto afecta a net.ParseIP y net.ParseCIDR\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.17\",\"matchCriteriaId\":\"D39D5C21-8281-429F-AC33-CE39821CA3EC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.1.1.0\",\"matchCriteriaId\":\"20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}],\"references\":[{\"url\":\"https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/30999\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/43389\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://go-review.googlesource.com/c/go/+/325829/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://golang.org/pkg/net/#ParseCIDR\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/30999\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/43389\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://go-review.googlesource.com/c/go/+/325829/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://golang.org/pkg/net/#ParseCIDR\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2023-AVI-0976
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.20 | ||
| IBM | Sterling Connect:Direct | Interface utilisateur IBM Sterling Connect:Direct versions 1.x antérieures à 1.5.0.2 iFix-39 | ||
| IBM | QRadar | Agent QRadar WinCollect (Standalone) versions antérieures à 10.1.8 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.0.x à 6.1.x antérieures à 6.1.0.22 | ||
| IBM | QRadar | Suite QRadar versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.0.x antérieures à 6.0.3.9 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.1.0.x à 6.1.2.x antérieures à 6.1.2.3 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.20",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Interface utilisateur IBM Sterling Connect:Direct versions 1.x ant\u00e9rieures \u00e0 1.5.0.2 iFix-39",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Agent QRadar WinCollect (Standalone) versions ant\u00e9rieures \u00e0 10.1.8",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.0.x \u00e0 6.1.x ant\u00e9rieures \u00e0 6.1.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Suite QRadar versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.1.0.x \u00e0 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-36313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36313"
},
{
"name": "CVE-2021-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42248"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2022-41966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-26279",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26279"
},
{
"name": "CVE-2022-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40153"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36777"
},
{
"name": "CVE-2023-32001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32001"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2017-18640",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18640"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40156"
},
{
"name": "CVE-2022-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40155"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2021-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39008"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2022-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40154"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0976",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080118 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080118"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080174 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080174"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080106 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080058 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080058"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080117 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080117"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080177 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080177"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080176 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080176"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7081403 du 22 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7081403"
}
]
}
CERTFR-2021-AVI-943
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Server versions 8.1.x antérieures à 8.1.13 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 7.1.x antérieures à 7.1.8.12 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 8.1.x antérieures à 8.1.13 | ||
| IBM | N/A | Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management version 2.2.x antérieures à 2.2.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 7.1.x ant\u00e9rieures \u00e0 7.1.8.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management version 2.2.x ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-39154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39154"
},
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-38947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38947"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-29505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29505"
},
{
"name": "CVE-2021-39146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39146"
},
{
"name": "CVE-2021-33502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-26258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26258"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2021-39149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39149"
},
{
"name": "CVE-2021-39065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39065"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-26259",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26259"
},
{
"name": "CVE-2021-39139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39139"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2021-39064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39064"
},
{
"name": "CVE-2021-39054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39054"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2021-39147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39147"
},
{
"name": "CVE-2021-39152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39152"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2021-39145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39145"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-39144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39144"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2020-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26217"
},
{
"name": "CVE-2021-39151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39151"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2021-39148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39148"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2021-39052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39052"
},
{
"name": "CVE-2021-39150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39150"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2021-39140",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39140"
},
{
"name": "CVE-2021-39058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39058"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2021-39153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39153"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32029"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-39053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39053"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2021-39141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39141"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-943",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525034 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525034"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525250 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525250"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525260 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525260"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524712 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524712"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525674 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525674"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524908 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524908"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525554 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525554"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525182 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525182"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2021-AVI-943
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Server versions 8.1.x antérieures à 8.1.13 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 7.1.x antérieures à 7.1.8.12 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 8.1.x antérieures à 8.1.13 | ||
| IBM | N/A | Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management version 2.2.x antérieures à 2.2.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 7.1.x ant\u00e9rieures \u00e0 7.1.8.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management version 2.2.x ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-39154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39154"
},
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-38947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38947"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-29505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29505"
},
{
"name": "CVE-2021-39146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39146"
},
{
"name": "CVE-2021-33502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-26258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26258"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2021-39149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39149"
},
{
"name": "CVE-2021-39065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39065"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-26259",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26259"
},
{
"name": "CVE-2021-39139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39139"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2021-39064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39064"
},
{
"name": "CVE-2021-39054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39054"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2021-39147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39147"
},
{
"name": "CVE-2021-39152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39152"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2021-39145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39145"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-39144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39144"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2020-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26217"
},
{
"name": "CVE-2021-39151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39151"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2021-39148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39148"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2021-39052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39052"
},
{
"name": "CVE-2021-39150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39150"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2021-39140",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39140"
},
{
"name": "CVE-2021-39058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39058"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2021-39153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39153"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32029"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-39053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39053"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2021-39141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39141"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-943",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525034 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525034"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525250 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525250"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525260 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525260"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524712 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524712"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525674 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525674"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524908 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524908"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525554 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525554"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525182 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525182"
}
]
}
CERTFR-2023-AVI-0976
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.20 | ||
| IBM | Sterling Connect:Direct | Interface utilisateur IBM Sterling Connect:Direct versions 1.x antérieures à 1.5.0.2 iFix-39 | ||
| IBM | QRadar | Agent QRadar WinCollect (Standalone) versions antérieures à 10.1.8 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.0.x à 6.1.x antérieures à 6.1.0.22 | ||
| IBM | QRadar | Suite QRadar versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.0.x antérieures à 6.0.3.9 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.1.0.x à 6.1.2.x antérieures à 6.1.2.3 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.10.x antérieures à 1.10.17.0 | ||
| IBM | Sterling Connect:Direct | Services Web IBM Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.20",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Interface utilisateur IBM Sterling Connect:Direct versions 1.x ant\u00e9rieures \u00e0 1.5.0.2 iFix-39",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Agent QRadar WinCollect (Standalone) versions ant\u00e9rieures \u00e0 10.1.8",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.0.x \u00e0 6.1.x ant\u00e9rieures \u00e0 6.1.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Suite QRadar versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.1.0.x \u00e0 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.10.17.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Services Web IBM Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-36313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36313"
},
{
"name": "CVE-2021-42248",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42248"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2022-41966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-26279",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26279"
},
{
"name": "CVE-2022-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40153"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36777"
},
{
"name": "CVE-2023-32001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32001"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2017-18640",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18640"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40156"
},
{
"name": "CVE-2022-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40155"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2021-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39008"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2022-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40154"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0976",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080118 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080118"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080174 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080174"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080106 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080058 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080058"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080117 du 20 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080117"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080177 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080177"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7080176 du 21 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7080176"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7081403 du 22 novembre 2023",
"url": "https://www.ibm.com/support/pages/node/7081403"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2023-AVI-0701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Universal Forwarder versions 9.0.x antérieures à 9.0.6 | ||
| Splunk | N/A | Splunk ITSI versions 4.15.x antérieures à 4.15.3 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.0.2305.200 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk ITSI versions 4.13.x antérieures à 4.13.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Universal Forwarder versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.15.x ant\u00e9rieures \u00e0 4.15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2305.200",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.13.x ant\u00e9rieures \u00e0 4.13.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2021-27919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27919"
},
{
"name": "CVE-2019-20454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20454"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-4571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4571"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2022-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27536"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2023-40592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40592"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-40596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40596"
},
{
"name": "CVE-2023-40594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40594"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2023-40595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40595"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2021-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
},
{
"name": "CVE-2023-40597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40597"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-40023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-40598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40598"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2023-40593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40593"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2021-20066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20066"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0802 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0804 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0806 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0806"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0810 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0810"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0807 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0807"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0808 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0808"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0803 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0801 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0805 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0809 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0809"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0811 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0811"
}
]
}
CERTFR-2023-AVI-0701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Universal Forwarder versions 9.0.x antérieures à 9.0.6 | ||
| Splunk | N/A | Splunk ITSI versions 4.15.x antérieures à 4.15.3 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.0.2305.200 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 8.2.x antérieures à 8.2.12 | ||
| Splunk | N/A | Splunk ITSI versions 4.13.x antérieures à 4.13.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Universal Forwarder versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.15.x ant\u00e9rieures \u00e0 4.15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2305.200",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk ITSI versions 4.13.x ant\u00e9rieures \u00e0 4.13.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2021-27919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27919"
},
{
"name": "CVE-2019-20454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20454"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-4571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4571"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2022-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27536"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2023-40592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40592"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-40596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40596"
},
{
"name": "CVE-2023-40594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40594"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2023-40595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40595"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2021-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
},
{
"name": "CVE-2023-40597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40597"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2020-29652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-40023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-40598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40598"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2023-40593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40593"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2021-20066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20066"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0802 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0804 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0806 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0806"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0810 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0810"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0807 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0807"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0808 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0808"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0803 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0801 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0805 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0809 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0809"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0811 du 30 ao\u00fbt 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0811"
}
]
}
RHSA-2021:4910
Vulnerability from csaf_redhat - Published: 2021-12-02 14:27 - Updated: 2025-11-21 18:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.8.3 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4910",
"url": "https://access.redhat.com/errata/RHSA-2021:4910"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2007344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4910.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:27:10+00:00",
"generator": {
"date": "2025-11-21T18:27:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:4910",
"initial_release_date": "2021-12-02T14:27:54+00:00",
"revision_history": [
{
"date": "2021-12-02T14:27:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-12-02T14:27:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:27:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.8 for RHEL 7",
"product": {
"name": "CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.8 for RHEL 8",
"product": {
"name": "CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.8.3-251.el7.src",
"product": {
"name": "kubevirt-0:4.8.3-251.el7.src",
"product_id": "kubevirt-0:4.8.3-251.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.8.3-251.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.8.3-251.el8.src",
"product": {
"name": "kubevirt-0:4.8.3-251.el8.src",
"product_id": "kubevirt-0:4.8.3-251.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.8.3-251.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.3-251.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.3-251.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.3-251.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.3-251.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.8.3-251.el7.src as a component of CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src"
},
"product_reference": "kubevirt-0:4.8.3-251.el7.src",
"relates_to_product_reference": "7Server-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64 as a component of CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64 as a component of CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.8.3-251.el8.src as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src"
},
"product_reference": "kubevirt-0:4.8.3-251.el8.src",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-02T14:27:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4910"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022:0997
Vulnerability from csaf_redhat - Published: 2022-03-23 22:11 - Updated: 2025-11-21 18:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-qpid-apache is now available for Red Hat OpenStack\nPlatform 16.2 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Golang binding library for qpid-proton\n\nSecurity Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0997",
"url": "https://access.redhat.com/errata/RHSA-2022:0997"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0997.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-qpid-apache) security update",
"tracking": {
"current_release_date": "2025-11-21T18:29:26+00:00",
"generator": {
"date": "2025-11-21T18:29:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0997",
"initial_release_date": "2022-03-23T22:11:36+00:00",
"revision_history": [
{
"date": "2022-03-23T22:11:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-23T22:11:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:29:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-23T22:11:36+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0997"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022:1372
Vulnerability from csaf_redhat - Published: 2022-04-13 18:48 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images that include numerous enhancements, security, and bug fixes\nare now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nBug Fix(es):\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\nor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1372",
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1898988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898988"
},
{
"category": "external",
"summary": "1954708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954708"
},
{
"category": "external",
"summary": "1956418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956418"
},
{
"category": "external",
"summary": "1970123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970123"
},
{
"category": "external",
"summary": "1972190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972190"
},
{
"category": "external",
"summary": "1974344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974344"
},
{
"category": "external",
"summary": "1981341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981341"
},
{
"category": "external",
"summary": "1981694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981694"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1991462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991462"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "1996830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996830"
},
{
"category": "external",
"summary": "1996833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996833"
},
{
"category": "external",
"summary": "1999689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999689"
},
{
"category": "external",
"summary": "1999952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999952"
},
{
"category": "external",
"summary": "2003532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003532"
},
{
"category": "external",
"summary": "2005801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005801"
},
{
"category": "external",
"summary": "2005919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005919"
},
{
"category": "external",
"summary": "2021313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021313"
},
{
"category": "external",
"summary": "2022424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022424"
},
{
"category": "external",
"summary": "2022693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022693"
},
{
"category": "external",
"summary": "2024107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024107"
},
{
"category": "external",
"summary": "2024545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024545"
},
{
"category": "external",
"summary": "2026007",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026007"
},
{
"category": "external",
"summary": "2027666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027666"
},
{
"category": "external",
"summary": "2027826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027826"
},
{
"category": "external",
"summary": "2028559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028559"
},
{
"category": "external",
"summary": "2029413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029413"
},
{
"category": "external",
"summary": "2030602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030602"
},
{
"category": "external",
"summary": "2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "2030839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030839"
},
{
"category": "external",
"summary": "2031023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031023"
},
{
"category": "external",
"summary": "2031705",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031705"
},
{
"category": "external",
"summary": "2032404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032404"
},
{
"category": "external",
"summary": "2032412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032412"
},
{
"category": "external",
"summary": "2032656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032656"
},
{
"category": "external",
"summary": "2032969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032969"
},
{
"category": "external",
"summary": "2032984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032984"
},
{
"category": "external",
"summary": "2033251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033251"
},
{
"category": "external",
"summary": "2034003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034003"
},
{
"category": "external",
"summary": "2034805",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034805"
},
{
"category": "external",
"summary": "2034904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034904"
},
{
"category": "external",
"summary": "2035774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035774"
},
{
"category": "external",
"summary": "2035995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035995"
},
{
"category": "external",
"summary": "2036018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036018"
},
{
"category": "external",
"summary": "2036211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036211"
},
{
"category": "external",
"summary": "2037279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037279"
},
{
"category": "external",
"summary": "2037318",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037318"
},
{
"category": "external",
"summary": "2037497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037497"
},
{
"category": "external",
"summary": "2038884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038884"
},
{
"category": "external",
"summary": "2039240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039240"
},
{
"category": "external",
"summary": "2040682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040682"
},
{
"category": "external",
"summary": "2041507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041507"
},
{
"category": "external",
"summary": "2042866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042866"
},
{
"category": "external",
"summary": "2043017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043017"
},
{
"category": "external",
"summary": "2043028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043028"
},
{
"category": "external",
"summary": "2043406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043406"
},
{
"category": "external",
"summary": "2043513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043513"
},
{
"category": "external",
"summary": "2044447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044447"
},
{
"category": "external",
"summary": "2044823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044823"
},
{
"category": "external",
"summary": "2045084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045084"
},
{
"category": "external",
"summary": "2046186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046186"
},
{
"category": "external",
"summary": "2046254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046254"
},
{
"category": "external",
"summary": "2046677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046677"
},
{
"category": "external",
"summary": "2046766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046766"
},
{
"category": "external",
"summary": "2046887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046887"
},
{
"category": "external",
"summary": "2047162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047162"
},
{
"category": "external",
"summary": "2047201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047201"
},
{
"category": "external",
"summary": "2047562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047562"
},
{
"category": "external",
"summary": "2047565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047565"
},
{
"category": "external",
"summary": "2047625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047625"
},
{
"category": "external",
"summary": "2047632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047632"
},
{
"category": "external",
"summary": "2047642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047642"
},
{
"category": "external",
"summary": "2048107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048107"
},
{
"category": "external",
"summary": "2048370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048370"
},
{
"category": "external",
"summary": "2048458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048458"
},
{
"category": "external",
"summary": "2049029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049029"
},
{
"category": "external",
"summary": "2049075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049075"
},
{
"category": "external",
"summary": "2049081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049081"
},
{
"category": "external",
"summary": "2049424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049424"
},
{
"category": "external",
"summary": "2049509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049509"
},
{
"category": "external",
"summary": "2049718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049718"
},
{
"category": "external",
"summary": "2049727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049727"
},
{
"category": "external",
"summary": "2049771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049771"
},
{
"category": "external",
"summary": "2049790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049790"
},
{
"category": "external",
"summary": "2050056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050056"
},
{
"category": "external",
"summary": "2050142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050142"
},
{
"category": "external",
"summary": "2050402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050402"
},
{
"category": "external",
"summary": "2050483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050483"
},
{
"category": "external",
"summary": "2051249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051249"
},
{
"category": "external",
"summary": "2051406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051406"
},
{
"category": "external",
"summary": "2051599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051599"
},
{
"category": "external",
"summary": "2051913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051913"
},
{
"category": "external",
"summary": "2052027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052027"
},
{
"category": "external",
"summary": "2052438",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052438"
},
{
"category": "external",
"summary": "2052937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052937"
},
{
"category": "external",
"summary": "2052996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052996"
},
{
"category": "external",
"summary": "2053156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053156"
},
{
"category": "external",
"summary": "2053517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053517"
},
{
"category": "external",
"summary": "2054147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054147"
},
{
"category": "external",
"summary": "2054755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054755"
},
{
"category": "external",
"summary": "2061251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1372.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security \u0026 bug fix update",
"tracking": {
"current_release_date": "2025-11-27T23:53:43+00:00",
"generator": {
"date": "2025-11-27T23:53:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:1372",
"initial_release_date": "2022-04-13T18:48:58+00:00",
"revision_history": [
{
"date": "2022-04-13T18:48:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-13T18:48:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHODF 4.10 for RHEL 8",
"product": {
"name": "RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_data_foundation:4.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Data Foundation"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"product": {
"name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"product_id": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"product": {
"name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"product_id": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"product_id": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"product": {
"name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"product_id": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"product": {
"name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"product_id": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"product_id": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"product": {
"name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"product_id": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"product": {
"name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"product_id": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"product": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"product": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"product": {
"name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"product_id": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"product": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"product_id": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"product": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"product_id": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"product": {
"name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"product_id": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"product": {
"name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"product_id": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"product": {
"name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"product_id": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"product_id": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"product": {
"name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"product_id": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"product": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"product_id": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"product": {
"name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"product_id": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"product": {
"name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"product_id": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"product": {
"name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"product_id": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"product_id": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"product": {
"name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"product_id": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"product": {
"name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"product_id": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"product_id": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"product": {
"name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"product_id": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"product": {
"name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"product_id": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"product": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"product": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"product": {
"name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"product_id": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"product": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"product_id": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"product": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"product_id": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"product": {
"name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"product_id": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"product": {
"name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"product_id": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"product": {
"name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"product_id": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"product_id": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"product": {
"name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"product_id": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"product": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"product_id": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"product": {
"name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"product_id": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"product": {
"name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"product_id": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"product": {
"name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"product_id": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"product_id": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"product": {
"name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"product_id": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"product": {
"name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"product_id": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"product_id": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"product": {
"name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"product_id": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"product": {
"name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"product_id": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"product": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"product": {
"name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"product_id": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"product": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"product_id": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"product": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"product_id": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"product": {
"name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"product_id": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"product": {
"name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"product_id": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"product": {
"name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"product_id": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"product_id": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"product": {
"name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"product_id": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"product": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"product_id": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"product": {
"name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"product_id": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x"
},
"product_reference": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64"
},
"product_reference": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le"
},
"product_reference": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64"
},
"product_reference": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le"
},
"product_reference": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x"
},
"product_reference": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le"
},
"product_reference": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x"
},
"product_reference": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64"
},
"product_reference": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le"
},
"product_reference": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64"
},
"product_reference": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x"
},
"product_reference": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64"
},
"product_reference": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x"
},
"product_reference": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le"
},
"product_reference": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le"
},
"product_reference": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x"
},
"product_reference": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64"
},
"product_reference": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64"
},
"product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x"
},
"product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x"
},
"product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le"
},
"product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64"
},
"product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64"
},
"product_reference": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x"
},
"product_reference": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le"
},
"product_reference": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x"
},
"product_reference": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le"
},
"product_reference": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64"
},
"product_reference": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le"
},
"product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64"
},
"product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x"
},
"product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x"
},
"product_reference": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le"
},
"product_reference": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64"
},
"product_reference": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le"
},
"product_reference": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64"
},
"product_reference": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x"
},
"product_reference": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64"
},
"product_reference": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le"
},
"product_reference": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x"
},
"product_reference": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64"
},
"product_reference": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x"
},
"product_reference": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le"
},
"product_reference": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x"
},
"product_reference": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64"
},
"product_reference": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le"
},
"product_reference": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le"
},
"product_reference": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x"
},
"product_reference": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
},
"product_reference": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-43565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-12-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030787"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: empty plaintext packet causes panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43565"
},
{
"category": "external",
"summary": "RHBZ#2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565"
}
],
"release_date": "2021-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/crypto: empty plaintext packet causes panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
},
{
"cve": "CVE-2021-44717",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030806"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: syscall: don\u0027t close fd 0 on ForkExec error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44717"
},
{
"category": "external",
"summary": "RHBZ#2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "This bug can be mitigated by raising the per-process file descriptor limit.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: syscall: don\u0027t close fd 0 on ForkExec error"
}
]
}
RHSA-2022_1276
Vulnerability from csaf_redhat - Published: 2022-04-07 18:02 - Updated: 2024-12-17 21:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 2.0.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)\n\n* envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)\n\n* istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)\n\n* envoy: Use-after-free when response filters increase response data (CVE-2021-43825)\n\n* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)\n\n* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)\n\n* istio: unauthenticated control plane denial of service attack (CVE-2022-23635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1276",
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1954368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "2050744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744"
},
{
"category": "external",
"summary": "2050746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746"
},
{
"category": "external",
"summary": "2050748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748"
},
{
"category": "external",
"summary": "2050753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753"
},
{
"category": "external",
"summary": "2050757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757"
},
{
"category": "external",
"summary": "2050758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758"
},
{
"category": "external",
"summary": "2057277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277"
},
{
"category": "external",
"summary": "2061638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1276.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update",
"tracking": {
"current_release_date": "2024-12-17T21:56:02+00:00",
"generator": {
"date": "2024-12-17T21:56:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:1276",
"initial_release_date": "2022-04-07T18:02:07+00:00",
"revision_history": [
{
"date": "2022-04-07T18:02:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-07T18:02:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:56:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 2.0",
"product": {
"name": "OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.src",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.src",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.src",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.src",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.src",
"product_id": "servicemesh-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.src",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28851",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28851"
},
{
"category": "external",
"summary": "RHBZ#1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension"
},
{
"cve": "CVE-2020-28852",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28852"
},
{
"category": "external",
"summary": "RHBZ#1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"cve": "CVE-2021-3749",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999784"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-axios: Regular expression denial of service in trim function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3749"
},
{
"category": "external",
"summary": "RHBZ#1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929",
"url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31",
"url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31"
}
],
"release_date": "2021-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-axios: Regular expression denial of service in trim function"
},
{
"cve": "CVE-2021-29482",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-04-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1954368"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/ulikunitz/xz. The function readUvarint may not terminate a loop what could lead to denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth authentication, therefore the impact is low.\nIn OCP before 4.7 the buildah, skopeo and podman packages include vulnerable version of github.com/ulikunitz/xz, but these OCP releases are already in the Maintenance Phase of the support, hence affected components are marked as wontfix. This may be fixed in the future.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29482"
},
{
"category": "external",
"summary": "RHBZ#1954368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482"
}
],
"release_date": "2020-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service"
},
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-43565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-12-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030787"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: empty plaintext packet causes panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43565"
},
{
"category": "external",
"summary": "RHBZ#2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565"
}
],
"release_date": "2021-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/crypto: empty plaintext packet causes panic"
},
{
"cve": "CVE-2021-43824",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. A crafted request can potentially trigger a NULL pointer dereference when using a WT filter safe_regex match.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Null pointer dereference when using JWT filter safe_regex match",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43824"
},
{
"category": "external",
"summary": "RHBZ#2050744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Null pointer dereference when using JWT filter safe_regex match"
},
{
"cve": "CVE-2021-43825",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050746"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. If the amount of buffered data by envoy goes over the limit, the buffer may overflow while a response is being processed by the filter chain. This issue possibly causes the operation to abort incorrectly, resulting in the access of a freed memory block.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Use-after-free when response filters increase response data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43825"
},
{
"category": "external",
"summary": "RHBZ#2050746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Use-after-free when response filters increase response data"
},
{
"cve": "CVE-2021-43826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050748"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. If a downstream source disconnects during upstream connection establishment when tunneling TCP over HTTP, a use-after-free can occur, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Use-after-free when tunneling TCP over HTTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43826"
},
{
"category": "external",
"summary": "RHBZ#2050748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Use-after-free when tunneling TCP over HTTP"
},
{
"cve": "CVE-2022-21654",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050753"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. When certificate validation settings are changed, incorrect configuration handling allows TLS session reuse without revalidation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21654"
},
{
"category": "external",
"summary": "RHBZ#2050753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21654",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21654"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation"
},
{
"cve": "CVE-2022-21655",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. Due to incorrect handling of the common router, a segfault is possible when internal redirects are routes with a direct response entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Incorrect handling of internal redirects to routes with a direct response entry",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21655"
},
{
"category": "external",
"summary": "RHBZ#2050757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "envoy: Incorrect handling of internal redirects to routes with a direct response entry"
},
{
"cve": "CVE-2022-23606",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050758"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. When a cluster is deleted via the Cluster Discovery Service, a stack exhaustion may occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23606"
},
{
"category": "external",
"summary": "RHBZ#2050758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23606"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service"
},
{
"cve": "CVE-2022-23635",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2022-02-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2057277"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in istio. This flaw allows an attacker to send a specially crafted message to isitiod, causing the control plane to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "istio: unauthenticated control plane denial of service attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23635"
},
{
"category": "external",
"summary": "RHBZ#2057277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635"
},
{
"category": "external",
"summary": "https://istio.io/latest/news/security/istio-security-2022-003",
"url": "https://istio.io/latest/news/security/istio-security-2022-003"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "istio: unauthenticated control plane denial of service attack"
},
{
"acknowledgments": [
{
"names": [
"Oliver Liu, John Howard and Jacob Delgado"
],
"organization": "Istio Product Security Working Group",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2022-24726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061638"
}
],
"notes": [
{
"category": "description",
"text": "A stack exhaustion flaw was found in the Istio control plane. This flaw allows a remote unauthenticated attacker to send a specially crafted or oversized message to crash the control plane process, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24726"
},
{
"category": "external",
"summary": "RHBZ#2061638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726"
},
{
"category": "external",
"summary": "https://istio.io/latest/news/security/istio-security-2022-004/",
"url": "https://istio.io/latest/news/security/istio-security-2022-004/"
}
],
"release_date": "2022-03-09T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion"
}
]
}
RHSA-2021_3431
Vulnerability from csaf_redhat - Published: 2021-09-07 08:38 - Updated: 2024-12-17 21:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-1.15-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3431",
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3431.json"
}
],
"title": "Red Hat Security Advisory: go-toolset-1.15-golang security update",
"tracking": {
"current_release_date": "2024-12-17T21:51:43+00:00",
"generator": {
"date": "2024-12-17T21:51:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:3431",
"initial_release_date": "2021-09-07T08:38:58+00:00",
"revision_history": [
{
"date": "2021-09-07T08:38:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-07T08:38:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:51:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2021"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2021"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Tools"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-race@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"product": {
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"product_id": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-docs@1.15.14-2.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch"
},
"product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch"
},
"product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-07T08:38:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-33195",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989564"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: lookup functions may return invalid host names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "RHBZ#1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-07T08:38:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: lookup functions may return invalid host names"
},
{
"cve": "CVE-2021-33197",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "RHBZ#1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-07T08:38:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty"
}
]
}
RHSA-2022_0989
Vulnerability from csaf_redhat - Published: 2022-03-24 10:58 - Updated: 2024-12-17 21:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-qpid-apache is now available for Red Hat OpenStack\nPlatform 16.1 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Golang binding library for qpid-proton\n\nSecurity Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0989",
"url": "https://access.redhat.com/errata/RHSA-2022:0989"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0989.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update",
"tracking": {
"current_release_date": "2024-12-17T21:55:31+00:00",
"generator": {
"date": "2024-12-17T21:55:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0989",
"initial_release_date": "2022-03-24T10:58:33+00:00",
"revision_history": [
{
"date": "2022-03-24T10:58:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-24T10:58:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:55:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.1",
"product": {
"name": "Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-24T10:58:33+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0989"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022_0997
Vulnerability from csaf_redhat - Published: 2022-03-23 22:11 - Updated: 2024-12-17 21:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-qpid-apache is now available for Red Hat OpenStack\nPlatform 16.2 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Golang binding library for qpid-proton\n\nSecurity Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0997",
"url": "https://access.redhat.com/errata/RHSA-2022:0997"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0997.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-qpid-apache) security update",
"tracking": {
"current_release_date": "2024-12-17T21:55:15+00:00",
"generator": {
"date": "2024-12-17T21:55:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0997",
"initial_release_date": "2022-03-23T22:11:36+00:00",
"revision_history": [
{
"date": "2022-03-23T22:11:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-23T22:11:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:55:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-23T22:11:36+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0997"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2021:3431
Vulnerability from csaf_redhat - Published: 2021-09-07 08:38 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for go-toolset-1.15-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3431",
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3431.json"
}
],
"title": "Red Hat Security Advisory: go-toolset-1.15-golang security update",
"tracking": {
"current_release_date": "2025-11-21T18:24:43+00:00",
"generator": {
"date": "2025-11-21T18:24:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3431",
"initial_release_date": "2021-09-07T08:38:58+00:00",
"revision_history": [
{
"date": "2021-09-07T08:38:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-07T08:38:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2021"
}
}
},
{
"category": "product_name",
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devtools:2021"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Tools"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-race@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"product": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"product": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"product": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"product": {
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"product_id": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset-1.15-golang-docs@1.15.14-2.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch"
},
"product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch"
},
"product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
},
"product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-DevTools-2021.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-07T08:38:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-33195",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989564"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: lookup functions may return invalid host names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "RHBZ#1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-07T08:38:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: lookup functions may return invalid host names"
},
{
"cve": "CVE-2021-33197",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "RHBZ#1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-07T08:38:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x",
"7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty"
}
]
}
RHSA-2021_4914
Vulnerability from csaf_redhat - Published: 2021-12-02 16:59 - Updated: 2024-12-17 21:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.8.3 images:\n\nRHEL-8-CNV-4.8\n==============\nhostpath-provisioner-container-v4.8.3-4\nkubevirt-v2v-conversion-container-v4.8.3-3\nvirt-cdi-cloner-container-v4.8.3-4\nvirt-cdi-operator-container-v4.8.3-4\nvirt-cdi-uploadproxy-container-v4.8.3-4\nvirt-launcher-container-v4.8.3-9\nvm-import-operator-container-v4.8.3-7\nvirt-cdi-apiserver-container-v4.8.3-4\nkubevirt-vmware-container-v4.8.3-3\nvirt-api-container-v4.8.3-9\nvm-import-virtv2v-container-v4.8.3-7\nvirtio-win-container-v4.8.3-3\nnode-maintenance-operator-container-v4.8.3-2\nhostpath-provisioner-operator-container-v4.8.3-4\nvirt-cdi-controller-container-v4.8.3-4\nvirt-cdi-importer-container-v4.8.3-4\nbridge-marker-container-v4.8.3-3\novs-cni-marker-container-v4.8.3-3\nvirt-handler-container-v4.8.3-9\nvirt-controller-container-v4.8.3-9\ncnv-containernetworking-plugins-container-v4.8.3-3\nkubevirt-template-validator-container-v4.8.3-3\nhyperconverged-cluster-webhook-container-v4.8.3-5\novs-cni-plugin-container-v4.8.3-3\nhyperconverged-cluster-operator-container-v4.8.3-5\nkubevirt-ssp-operator-container-v4.8.3-4\nvirt-cdi-uploadserver-container-v4.8.3-4\nkubemacpool-container-v4.8.3-5\nvm-import-controller-container-v4.8.3-7\nvirt-operator-container-v4.8.3-9\nkubernetes-nmstate-handler-container-v4.8.3-8\ncnv-must-gather-container-v4.8.3-12\ncluster-network-addons-operator-container-v4.8.3-8\nhco-bundle-registry-container-v4.8.3-58\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4914",
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1997017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997017"
},
{
"category": "external",
"summary": "1998855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998855"
},
{
"category": "external",
"summary": "2000251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000251"
},
{
"category": "external",
"summary": "2001270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001270"
},
{
"category": "external",
"summary": "2001281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001281"
},
{
"category": "external",
"summary": "2001901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001901"
},
{
"category": "external",
"summary": "2007336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007336"
},
{
"category": "external",
"summary": "2007776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007776"
},
{
"category": "external",
"summary": "2008511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008511"
},
{
"category": "external",
"summary": "2012890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012890"
},
{
"category": "external",
"summary": "2025475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025475"
},
{
"category": "external",
"summary": "2026881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026881"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4914.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update",
"tracking": {
"current_release_date": "2024-12-17T21:52:16+00:00",
"generator": {
"date": "2024-12-17T21:52:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:4914",
"initial_release_date": "2021-12-02T16:59:15+00:00",
"revision_history": [
{
"date": "2021-12-02T16:59:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-12-02T16:59:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:52:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.8 for RHEL 8",
"product": {
"name": "CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"product": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.8.3-8"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.8.3-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"product_id": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.8.3-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"product": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"product_id": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"product_identification_helper": {
"purl": "pkg:oci/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.8.3-2"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v4.8.3-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.8.3-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"product": {
"name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.8.3-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"product": {
"name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.8.3-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64"
},
"product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64"
},
"product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64"
},
"product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
},
"product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-02T16:59:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-02T16:59:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2021_4722
Vulnerability from csaf_redhat - Published: 2021-11-17 15:38 - Updated: 2024-12-17 21:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 2.6.8 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4722",
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2012329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012329"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4722.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2024-12-17T21:52:29+00:00",
"generator": {
"date": "2024-12-17T21:52:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:4722",
"initial_release_date": "2021-11-17T15:38:20+00:00",
"revision_history": [
{
"date": "2021-11-17T15:38:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-17T15:38:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:52:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
},
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 7",
"product": {
"name": "CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el7"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:2.6.8-211.el8.src",
"product": {
"name": "kubevirt-0:2.6.8-211.el8.src",
"product_id": "kubevirt-0:2.6.8-211.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@2.6.8-211.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:2.6.8-211.el7.src",
"product": {
"name": "kubevirt-0:2.6.8-211.el7.src",
"product_id": "kubevirt-0:2.6.8-211.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@2.6.8-211.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"product_id": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.8-211.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.8-211.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"product_id": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.8-211.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.8-211.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:2.6.8-211.el7.src as a component of CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src"
},
"product_reference": "kubevirt-0:2.6.8-211.el7.src",
"relates_to_product_reference": "7Server-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64 as a component of CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64 as a component of CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:2.6.8-211.el8.src as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src"
},
"product_reference": "kubevirt-0:2.6.8-211.el8.src",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T15:38:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T15:38:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2021:4722
Vulnerability from csaf_redhat - Published: 2021-11-17 15:38 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 2.6.8 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4722",
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2012329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012329"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4722.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2025-11-27T23:53:28+00:00",
"generator": {
"date": "2025-11-27T23:53:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2021:4722",
"initial_release_date": "2021-11-17T15:38:20+00:00",
"revision_history": [
{
"date": "2021-11-17T15:38:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-17T15:38:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
},
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 7",
"product": {
"name": "CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el7"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:2.6.8-211.el8.src",
"product": {
"name": "kubevirt-0:2.6.8-211.el8.src",
"product_id": "kubevirt-0:2.6.8-211.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@2.6.8-211.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:2.6.8-211.el7.src",
"product": {
"name": "kubevirt-0:2.6.8-211.el7.src",
"product_id": "kubevirt-0:2.6.8-211.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@2.6.8-211.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"product_id": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.8-211.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.8-211.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"product_id": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.8-211.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.8-211.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:2.6.8-211.el7.src as a component of CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src"
},
"product_reference": "kubevirt-0:2.6.8-211.el7.src",
"relates_to_product_reference": "7Server-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64 as a component of CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64 as a component of CNV 2.6 for RHEL 7",
"product_id": "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:2.6.8-211.el8.src as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src"
},
"product_reference": "kubevirt-0:2.6.8-211.el8.src",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T15:38:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T15:38:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src",
"7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64",
"7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64",
"8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src",
"8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64",
"8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2021_3585
Vulnerability from csaf_redhat - Published: 2021-09-21 10:07 - Updated: 2024-12-17 21:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3585",
"url": "https://access.redhat.com/errata/RHSA-2021:3585"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset",
"url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3585.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2024-12-17T21:51:49+00:00",
"generator": {
"date": "2024-12-17T21:51:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:3585",
"initial_release_date": "2021-09-21T10:07:10+00:00",
"revision_history": [
{
"date": "2021-09-21T10:07:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-21T10:07:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:51:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset:rhel8:8040020210909125047:5081a262",
"product": {
"name": "go-toolset:rhel8:8040020210909125047:5081a262",
"product_id": "go-toolset:rhel8:8040020210909125047:5081a262",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product": {
"name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_id": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product": {
"name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_id": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product": {
"name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_id": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product": {
"name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_id": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=src"
}
}
},
{
"category": "product_version",
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"product": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product_id": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product_id": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product": {
"name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_id": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
"product_reference": "go-toolset:rhel8:8040020210909125047:5081a262",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64"
},
"product_reference": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64"
},
"product_reference": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
},
"product_reference": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
},
"product_reference": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64"
},
"product_reference": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
},
"product_reference": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
},
"product_reference": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-21T10:07:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3585"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022_0432
Vulnerability from csaf_redhat - Published: 2022-02-03 16:10 - Updated: 2024-12-17 21:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Release of OpenShift Serverless Client kn 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Serverless Client kn 1.20.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.20.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0432",
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "2024823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0432.json"
}
],
"title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0",
"tracking": {
"current_release_date": "2024-12-17T21:54:04+00:00",
"generator": {
"date": "2024-12-17T21:54:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0432",
"initial_release_date": "2022-02-03T16:10:33+00:00",
"revision_history": [
{
"date": "2022-02-03T16:10:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-03T16:10:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:54:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Serverless 1.0",
"product": {
"name": "Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.src as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T16:10:33+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-38297",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2012887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: Command-line arguments may overwrite global data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38297"
},
{
"category": "external",
"summary": "RHBZ#2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A",
"url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A"
}
],
"release_date": "2021-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T16:10:33+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: Command-line arguments may overwrite global data"
},
{
"cve": "CVE-2021-39293",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2006044"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39293"
},
{
"category": "external",
"summary": "RHBZ#2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"release_date": "2021-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T16:10:33+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)"
}
]
}
RHSA-2021:3585
Vulnerability from csaf_redhat - Published: 2021-09-21 10:07 - Updated: 2025-11-21 18:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3585",
"url": "https://access.redhat.com/errata/RHSA-2021:3585"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset",
"url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3585.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2025-11-21T18:25:18+00:00",
"generator": {
"date": "2025-11-21T18:25:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3585",
"initial_release_date": "2021-09-21T10:07:10+00:00",
"revision_history": [
{
"date": "2021-09-21T10:07:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-21T10:07:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:25:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=src\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=src\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src (go-toolset:rhel8)",
"product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=src\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8040020210909125047:5081a262"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-21T10:07:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3585"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8",
"AppStream-8.4.0.Z.MAIN.EUS:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022_0988
Vulnerability from csaf_redhat - Published: 2022-03-24 10:59 - Updated: 2024-12-17 21:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-vbatts-tar-split is now available for Red Hat\nOpenStack Platform 16.1 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0988",
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2020629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020629"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0988.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update",
"tracking": {
"current_release_date": "2024-12-17T21:55:23+00:00",
"generator": {
"date": "2024-12-17T21:55:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0988",
"initial_release_date": "2022-03-24T10:59:08+00:00",
"revision_history": [
{
"date": "2022-03-24T10:59:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-24T10:59:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:55:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.1",
"product": {
"name": "Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-24T10:59:08+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-24T10:59:08+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2022:0557
Vulnerability from csaf_redhat - Published: 2022-02-23 12:47 - Updated: 2025-11-21 18:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0557",
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0557.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update",
"tracking": {
"current_release_date": "2025-11-21T18:28:51+00:00",
"generator": {
"date": "2025-11-21T18:28:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0557",
"initial_release_date": "2022-02-23T12:47:14+00:00",
"revision_history": [
{
"date": "2022-02-23T12:47:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-23T12:47:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:28:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.9",
"product": {
"name": "Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.9::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.9",
"product": {
"name": "Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"product": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"product": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.src",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.src",
"product_id": "cri-tools-0:1.22.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"product": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.src",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.src",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.x86_64",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.x86_64",
"product_id": "cri-tools-0:1.22.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_id": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"product": {
"name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"product_id": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-redistributable@0.13.1-2.rhaos4.9.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.aarch64",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.aarch64",
"product_id": "cri-tools-0:1.22.0-2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.ppc64le",
"product_id": "cri-tools-0:1.22.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.s390x",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.s390x",
"product_id": "cri-tools-0:1.22.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src"
},
"product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src"
},
"product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch"
},
"product_reference": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src"
},
"product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
},
{
"cve": "CVE-2021-44717",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030806"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: syscall: don\u0027t close fd 0 on ForkExec error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44717"
},
{
"category": "external",
"summary": "RHBZ#2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "This bug can be mitigated by raising the per-process file descriptor limit.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: syscall: don\u0027t close fd 0 on ForkExec error"
}
]
}
RHSA-2021_4902
Vulnerability from csaf_redhat - Published: 2021-12-01 17:22 - Updated: 2024-12-17 21:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The release of RHACS 3.67 provides the following new features, bug fixes, security patches and system changes:\n\nOpenShift Dedicated support\n\nRHACS 3.67 is thoroughly tested and supported on OpenShift Dedicated on Amazon Web Services and Google Cloud Platform.\n\n1. Use OpenShift OAuth server as an identity provider\nIf you are using RHACS with OpenShift, you can now configure the built-in OpenShift OAuth server as an identity provider for RHACS. \n\n2. Enhancements for CI outputs\nRed Hat has improved the usability of RHACS CI integrations. CI outputs now show additional detailed information about the vulnerabilities and the security policies responsible for broken builds.\n\n3. Runtime Class policy criteria\nUsers can now use RHACS to define the container runtime configuration that may be used to run a pod\u2019s containers using the Runtime Class policy criteria.\n\nSecurity Fix(es):\n\n* civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API (CVE-2020-27304)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* nodejs-prismjs: ReDoS vulnerability (CVE-2021-3801)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* helm: information disclosure vulnerability (CVE-2021-32690)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes\nThe release of RHACS 3.67 includes the following bug fixes:\n\n1. Previously, when using RHACS with the Compliance Operator integration, RHACS did not respect or populate Compliance Operator TailoredProfiles. This has been fixed.\n\n2. Previously, the Alpine Linux package manager (APK) in Image policy looked for the presence of apk package in the image rather than the apk-tools package. This issue has been fixed.\n\nSystem changes\nThe release of RHACS 3.67 includes the following system changes:\n\n1. Scanner now identifies vulnerabilities in Ubuntu 21.10 images.\n2. The Port exposure method policy criteria now include route as an exposure method.\n3. The OpenShift: Kubeadmin Secret Accessed security policy now allows the OpenShift Compliance Operator to check for the existence of the Kubeadmin secret without creating a violation.\n4. The OpenShift Compliance Operator integration now supports using TailoredProfiles.\n5. The RHACS Jenkins plugin now provides additional security information.\n6. When you enable the environment variable ROX_NETWORK_ACCESS_LOG for Central, the logs contain the Request URI and X-Forwarded-For header values.\n7. The default uid:gid pair for the Scanner image is now 65534:65534.\n8. RHACS adds a new default Scope Manager role that includes minimum permissions to create and modify access scopes.\n9. If microdnf is part of an image or shows up in process execution, RHACS reports it as a security violation for the Red Hat Package Manager in Image or the Red Hat Package Manager Execution security policies.\n10. In addition to manually uploading vulnerability definitions in offline mode, you can now upload definitions in online mode. \n11. You can now format the output of the following roxctl CLI commands in table, csv, or JSON format: image scan, image check \u0026 deployment check\n12. You can now use a regular expression for the deployment name while specifying policy exclusions",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4902",
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1956818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818"
},
{
"category": "external",
"summary": "1978144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "2005445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445"
},
{
"category": "external",
"summary": "2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "2016640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640"
},
{
"category": "external",
"summary": "ROX-9371",
"url": "https://issues.redhat.com/browse/ROX-9371"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4902.json"
}
],
"title": "Red Hat Security Advisory: ACS 3.67 security and enhancement update",
"tracking": {
"current_release_date": "2024-12-17T21:52:56+00:00",
"generator": {
"date": "2024-12-17T21:52:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:4902",
"initial_release_date": "2021-12-01T17:22:46+00:00",
"revision_history": [
{
"date": "2021-12-01T17:22:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-12-01T17:22:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:52:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHACS 3.67 for RHEL 8",
"product": {
"name": "RHACS 3.67 for RHEL 8",
"product_id": "8Base-RHACS-3.67",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:advanced_cluster_security:3.67::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Security for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.67.0-2"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.67.0-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64 as a component of RHACS 3.67 for RHEL 8",
"product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"relates_to_product_reference": "8Base-RHACS-3.67"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64 as a component of RHACS 3.67 for RHEL 8",
"product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"relates_to_product_reference": "8Base-RHACS-3.67"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-27304",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2021-10-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016640"
}
],
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability was found in CivetWeb (embeddable web server/library). Due to a directory traversal issue, an attacker is able to add or overwrite files that are subsequently executed which lead to impact to confidentiality, integrity, and availability of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only impacts CivetWeb-based web applications that use the built-in file upload form handler (full working example in the \u201cembedded_c\u201d example in the CivetWeb sources).\n\nRed Hat Advanced Cluster Security includes code from CivetWeb in the Collector component, however it does not use the file upload form handler, hence is not impacted by this vulnerability. This vulnerability is rated Low for Red Hat Advanced Cluster Security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27304"
},
{
"category": "external",
"summary": "RHBZ#2016640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304"
},
{
"category": "external",
"summary": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ",
"url": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ"
},
{
"category": "external",
"summary": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/",
"url": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/"
}
],
"release_date": "2021-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API"
},
{
"cve": "CVE-2021-3749",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999784"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-axios: Regular expression denial of service in trim function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3749"
},
{
"category": "external",
"summary": "RHBZ#1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929",
"url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31",
"url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31"
}
],
"release_date": "2021-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-axios: Regular expression denial of service in trim function"
},
{
"cve": "CVE-2021-3801",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2005445"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient Regular Expression Complexity in prismjs leads to a Regular Expression Denial of Service (ReDoS) attack. An unauthenticated attacker can exploit this flaw to cause an application to consume an excess amount of CPU by providing a crafted HTML comment as input. This can result in a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-prismjs: ReDoS vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of prismjs. However due to the instance being read only and behind OpenShift OAuth, it has been given a Low impact. Additionally it has been marked as wont-fix at this time and may be fixed in a future release.\n\nJust as OCP, OpenShift ServiceMesh (OSSM) components are behind OpenShift OAuth what reducing impact to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3801"
},
{
"category": "external",
"summary": "RHBZ#2005445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801"
}
],
"release_date": "2021-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-prismjs: ReDoS vulnerability"
},
{
"cve": "CVE-2021-23343",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1956818"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23343"
},
{
"category": "external",
"summary": "RHBZ#1956818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067",
"url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067"
}
],
"release_date": "2021-05-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe"
},
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-32690",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1978144"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "helm: information disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32690"
},
{
"category": "external",
"summary": "RHBZ#1978144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690"
},
{
"category": "external",
"summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf",
"url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf"
}
],
"release_date": "2021-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "helm: information disclosure vulnerability"
},
{
"cve": "CVE-2021-39293",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2006044"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39293"
},
{
"category": "external",
"summary": "RHBZ#2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"release_date": "2021-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)"
}
]
}
RHSA-2022_0998
Vulnerability from csaf_redhat - Published: 2022-03-23 22:12 - Updated: 2024-12-17 21:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-vbatts-tar-split is now available for Red Hat\nOpenStack Platform 16.2 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0998",
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0998.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update",
"tracking": {
"current_release_date": "2024-12-17T21:55:08+00:00",
"generator": {
"date": "2024-12-17T21:55:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0998",
"initial_release_date": "2022-03-23T22:12:28+00:00",
"revision_history": [
{
"date": "2022-03-23T22:12:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-23T22:12:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:55:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-23T22:12:28+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-23T22:12:28+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2021:4914
Vulnerability from csaf_redhat - Published: 2021-12-02 16:59 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.8.3 images:\n\nRHEL-8-CNV-4.8\n==============\nhostpath-provisioner-container-v4.8.3-4\nkubevirt-v2v-conversion-container-v4.8.3-3\nvirt-cdi-cloner-container-v4.8.3-4\nvirt-cdi-operator-container-v4.8.3-4\nvirt-cdi-uploadproxy-container-v4.8.3-4\nvirt-launcher-container-v4.8.3-9\nvm-import-operator-container-v4.8.3-7\nvirt-cdi-apiserver-container-v4.8.3-4\nkubevirt-vmware-container-v4.8.3-3\nvirt-api-container-v4.8.3-9\nvm-import-virtv2v-container-v4.8.3-7\nvirtio-win-container-v4.8.3-3\nnode-maintenance-operator-container-v4.8.3-2\nhostpath-provisioner-operator-container-v4.8.3-4\nvirt-cdi-controller-container-v4.8.3-4\nvirt-cdi-importer-container-v4.8.3-4\nbridge-marker-container-v4.8.3-3\novs-cni-marker-container-v4.8.3-3\nvirt-handler-container-v4.8.3-9\nvirt-controller-container-v4.8.3-9\ncnv-containernetworking-plugins-container-v4.8.3-3\nkubevirt-template-validator-container-v4.8.3-3\nhyperconverged-cluster-webhook-container-v4.8.3-5\novs-cni-plugin-container-v4.8.3-3\nhyperconverged-cluster-operator-container-v4.8.3-5\nkubevirt-ssp-operator-container-v4.8.3-4\nvirt-cdi-uploadserver-container-v4.8.3-4\nkubemacpool-container-v4.8.3-5\nvm-import-controller-container-v4.8.3-7\nvirt-operator-container-v4.8.3-9\nkubernetes-nmstate-handler-container-v4.8.3-8\ncnv-must-gather-container-v4.8.3-12\ncluster-network-addons-operator-container-v4.8.3-8\nhco-bundle-registry-container-v4.8.3-58\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4914",
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1997017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997017"
},
{
"category": "external",
"summary": "1998855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998855"
},
{
"category": "external",
"summary": "2000251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000251"
},
{
"category": "external",
"summary": "2001270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001270"
},
{
"category": "external",
"summary": "2001281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001281"
},
{
"category": "external",
"summary": "2001901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001901"
},
{
"category": "external",
"summary": "2007336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007336"
},
{
"category": "external",
"summary": "2007776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007776"
},
{
"category": "external",
"summary": "2008511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008511"
},
{
"category": "external",
"summary": "2012890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012890"
},
{
"category": "external",
"summary": "2025475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025475"
},
{
"category": "external",
"summary": "2026881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026881"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4914.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update",
"tracking": {
"current_release_date": "2025-11-27T23:53:29+00:00",
"generator": {
"date": "2025-11-27T23:53:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2021:4914",
"initial_release_date": "2021-12-02T16:59:15+00:00",
"revision_history": [
{
"date": "2021-12-02T16:59:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-12-02T16:59:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.8 for RHEL 8",
"product": {
"name": "CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"product": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.8.3-8"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.8.3-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"product_id": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.8.3-3"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"product": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"product_id": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"product_identification_helper": {
"purl": "pkg:oci/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.8.3-2"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v4.8.3-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.8.3-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"product": {
"name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.8.3-7"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"product": {
"name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.8.3-7"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64"
},
"product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64"
},
"product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64"
},
"product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
},
"product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64",
"relates_to_product_reference": "8Base-CNV-4.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-02T16:59:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-02T16:59:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64",
"8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64",
"8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64",
"8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2022:0561
Vulnerability from csaf_redhat - Published: 2022-02-23 12:57 - Updated: 2025-11-21 18:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.9.22. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2022:0557\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n$ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-x86_64\n\nThe image digest is\nsha256:912e4b9986f690b894fcb740881e780600e12ab22f128f6f873bc4e1fcda8d13\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-s390x\n\nThe image digest is\nsha256:fa19f34390bc50968af736bdedb193b36d5d832b1090bf215e1fe279f05d6c94\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le\n\nThe image digest is\nsha256:857cab82eba0ad370669258da450b89d8c6e5cea25c61ee930f9e30bfcd515dd\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0561",
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "2015706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015706"
},
{
"category": "external",
"summary": "2022158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022158"
},
{
"category": "external",
"summary": "2023339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023339"
},
{
"category": "external",
"summary": "2026553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026553"
},
{
"category": "external",
"summary": "2028250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028250"
},
{
"category": "external",
"summary": "2028812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028812"
},
{
"category": "external",
"summary": "2029867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029867"
},
{
"category": "external",
"summary": "2032985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032985"
},
{
"category": "external",
"summary": "2033274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033274"
},
{
"category": "external",
"summary": "2033672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033672"
},
{
"category": "external",
"summary": "2038252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038252"
},
{
"category": "external",
"summary": "2042444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042444"
},
{
"category": "external",
"summary": "2042494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042494"
},
{
"category": "external",
"summary": "2042677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042677"
},
{
"category": "external",
"summary": "2043650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043650"
},
{
"category": "external",
"summary": "2043807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043807"
},
{
"category": "external",
"summary": "2046476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046476"
},
{
"category": "external",
"summary": "2047350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047350"
},
{
"category": "external",
"summary": "2048173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048173"
},
{
"category": "external",
"summary": "2049774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049774"
},
{
"category": "external",
"summary": "2050311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050311"
},
{
"category": "external",
"summary": "2051523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051523"
},
{
"category": "external",
"summary": "2052063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052063"
},
{
"category": "external",
"summary": "2052549",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052549"
},
{
"category": "external",
"summary": "2052850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052850"
},
{
"category": "external",
"summary": "2053222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053222"
},
{
"category": "external",
"summary": "2053496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053496"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0561.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update",
"tracking": {
"current_release_date": "2025-11-21T18:28:48+00:00",
"generator": {
"date": "2025-11-21T18:28:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0561",
"initial_release_date": "2022-02-23T12:57:44+00:00",
"revision_history": [
{
"date": "2022-02-23T12:57:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-23T12:57:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:28:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.9",
"product": {
"name": "Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"product_id": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"product": {
"name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"product_id": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_id": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gfd2d838.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"product": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.9.0-202202120107.p0.g0e0c173.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"product_id": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"product": {
"name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"product_id": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"product": {
"name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"product_id": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"product": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.9.0-202202120107.p0.g90b5722.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"product_id": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g1e8c94f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"product_id": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"product": {
"name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"product_id": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"product_id": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"product_id": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"product": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"product_id": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"product": {
"name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"product_id": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"product": {
"name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"product_id": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"product": {
"name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"product_id": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"product": {
"name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"product_id": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"product_id": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"product_id": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"product": {
"name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"product_id": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"product_id": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"product": {
"name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"product_id": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"product": {
"name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"product_id": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"product_id": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"product": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g18d82a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g26f1b6f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g8226e86.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"product": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g37a1328.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"product": {
"name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"product_id": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gc02678d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"product": {
"name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"product_id": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-node-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gc02678d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"product": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"product_id": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gade7373.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"product": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"product_id": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g15e474c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"product": {
"name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"product_id": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"product_id": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"product": {
"name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"product_id": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_id": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"product": {
"name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"product_id": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"product": {
"name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"product_id": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"product": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"product_id": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.gd92b088.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g48d49f7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.gd8a891d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"product_id": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"product": {
"name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"product_id": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"product_id": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"product_id": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"product": {
"name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"product_id": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"product": {
"name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"product_id": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"product_id": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"product_id": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"product_id": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"product_id": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"product_id": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_id": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product": {
"name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_id": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_id": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g9f56afd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product": {
"name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_id": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g9f56afd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"product": {
"name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"product_id": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-problem-detector-rhel8\u0026tag=v4.9.0-202202120107.p0.gde8606f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"product_id": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"product": {
"name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"product_id": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"product": {
"name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"product_id": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-syncer-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"product_id": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"product_id": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"product_id": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"product": {
"name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"product_id": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_id": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"product_id": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"product": {
"name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"product_id": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"product": {
"name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"product_id": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"product_id": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"product_id": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"product_id": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"product": {
"name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"product_id": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"product": {
"name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"product_id": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"product": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"product_id": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"product": {
"name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"product_id": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"product": {
"name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"product_id": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"product": {
"name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"product_id": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"product": {
"name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"product_id": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"product_id": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"product": {
"name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"product_id": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"product": {
"name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"product_id": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"product": {
"name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"product_id": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"product": {
"name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"product_id": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"product": {
"name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"product_id": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"product": {
"name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"product_id": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"product_id": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"product_id": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_id": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"product": {
"name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"product_id": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"product_id": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"product": {
"name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"product_id": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"product_id": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"product_id": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"product_id": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"product": {
"name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"product_id": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"product_id": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"product_id": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"product_id": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"product_id": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"product_id": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"product_id": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"product_id": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"product": {
"name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"product_id": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"product_id": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"product_id": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"product_id": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"product": {
"name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"product_id": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_id": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gfd2d838.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.9.0-202202120107.p0.g0e0c173.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"product_id": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"product": {
"name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"product_id": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"product": {
"name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"product_id": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"product": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.9.0-202202120107.p0.g90b5722.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"product_id": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"product_id": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g1e8c94f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"product_id": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"product": {
"name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"product_id": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"product": {
"name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"product_id": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"product": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"product_id": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"product": {
"name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"product_id": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"product": {
"name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"product_id": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"product": {
"name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"product_id": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"product": {
"name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"product_id": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"product_id": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"product": {
"name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"product_id": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"product": {
"name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"product_id": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"product": {
"name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"product_id": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"product": {
"name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"product_id": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"product": {
"name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"product_id": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"product": {
"name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"product_id": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"product_id": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"product_id": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_id": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"product": {
"name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"product_id": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"product": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"product_id": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.gd92b088.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g48d49f7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.gd8a891d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"product_id": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"product": {
"name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"product_id": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"product_id": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"product_id": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"product_id": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"product": {
"name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"product_id": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"product_id": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"product_id": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"product_id": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"product_id": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"product_id": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"product_id": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"product_id": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"product": {
"name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"product_id": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"product_id": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"product": {
"name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"product_id": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_id": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"product_id": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"product": {
"name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"product_id": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"product": {
"name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"product_id": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"product_id": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"product_id": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"product_id": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"product_id": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"product": {
"name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"product_id": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"product": {
"name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"product_id": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"product": {
"name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"product_id": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"product": {
"name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"product_id": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"product_id": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"product_id": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"product": {
"name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"product_id": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"product_id": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"product": {
"name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"product_id": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"product": {
"name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"product_id": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"product_id": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"product": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g18d82a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g26f1b6f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g8226e86.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"product": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g37a1328.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"product_id": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_id": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"product": {
"name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"product_id": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"product_id": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"product": {
"name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"product_id": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"product_id": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"product_id": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"product": {
"name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"product_id": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"product_id": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"product_id": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"product_id": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"product_id": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"product_id": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"product_id": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"product": {
"name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"product_id": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64"
},
"product_reference": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64"
},
"product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64"
},
"product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64"
},
"product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64"
},
"product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64"
},
"product_reference": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64"
},
"product_reference": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64"
},
"product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64"
},
"product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64"
},
"product_reference": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le"
},
"product_reference": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x"
},
"product_reference": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64"
},
"product_reference": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le"
},
"product_reference": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64"
},
"product_reference": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x"
},
"product_reference": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64"
},
"product_reference": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64"
},
"product_reference": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le"
},
"product_reference": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64"
},
"product_reference": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x"
},
"product_reference": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64"
},
"product_reference": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64"
},
"product_reference": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x"
},
"product_reference": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le"
},
"product_reference": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64"
},
"product_reference": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le"
},
"product_reference": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x"
},
"product_reference": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64"
},
"product_reference": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64"
},
"product_reference": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64"
},
"product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x"
},
"product_reference": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64"
},
"product_reference": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le"
},
"product_reference": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64"
},
"product_reference": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le"
},
"product_reference": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x"
},
"product_reference": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x"
},
"product_reference": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le"
},
"product_reference": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64"
},
"product_reference": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x"
},
"product_reference": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le"
},
"product_reference": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64"
},
"product_reference": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le"
},
"product_reference": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64"
},
"product_reference": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64"
},
"product_reference": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le"
},
"product_reference": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x"
},
"product_reference": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64"
},
"product_reference": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le"
},
"product_reference": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x"
},
"product_reference": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le"
},
"product_reference": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64"
},
"product_reference": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64"
},
"product_reference": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x"
},
"product_reference": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le"
},
"product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64"
},
"product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x"
},
"product_reference": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64"
},
"product_reference": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64"
},
"product_reference": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le"
},
"product_reference": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64"
},
"product_reference": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le"
},
"product_reference": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x"
},
"product_reference": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64"
},
"product_reference": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x"
},
"product_reference": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64"
},
"product_reference": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le"
},
"product_reference": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64"
},
"product_reference": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x"
},
"product_reference": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le"
},
"product_reference": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x"
},
"product_reference": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64"
},
"product_reference": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64"
},
"product_reference": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le"
},
"product_reference": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x"
},
"product_reference": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64"
},
"product_reference": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le"
},
"product_reference": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64"
},
"product_reference": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64"
},
"product_reference": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64"
},
"product_reference": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le"
},
"product_reference": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x"
},
"product_reference": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64"
},
"product_reference": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x"
},
"product_reference": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le"
},
"product_reference": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64"
},
"product_reference": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64"
},
"product_reference": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64"
},
"product_reference": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64"
},
"product_reference": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64"
},
"product_reference": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64"
},
"product_reference": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64"
},
"product_reference": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"known_not_affected": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:57:44+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"known_not_affected": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:57:44+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
}
]
}
RHSA-2021:4725
Vulnerability from csaf_redhat - Published: 2021-11-17 18:39 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.8 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-v2v-conversion-container-v2.6.8-1\nhyperconverged-cluster-webhook-container-v2.6.8-1\nvm-import-controller-container-v2.6.8-1\nkubevirt-cpu-model-nfd-plugin-container-v2.6.8-2\nvm-import-operator-container-v2.6.8-1\nkubevirt-cpu-node-labeller-container-v2.6.8-1\nkubevirt-ssp-operator-container-v2.6.8-1\nkubemacpool-container-v2.6.8-1\ncluster-network-addons-operator-container-v2.6.8-1\nvirt-cdi-cloner-container-v2.6.8-1\nvirt-cdi-uploadproxy-container-v2.6.8-1\nkubernetes-nmstate-handler-container-v2.6.8-1\novs-cni-plugin-container-v2.6.8-1\novs-cni-marker-container-v2.6.8-1\nhostpath-provisioner-operator-container-v2.6.8-1\nkubevirt-vmware-container-v2.6.8-2\nkubevirt-template-validator-container-v2.6.8-2\nkubevirt-kvm-info-nfd-plugin-container-v2.6.8-1\nnode-maintenance-operator-container-v2.6.8-1\nvm-import-virtv2v-container-v2.6.8-1\nhostpath-provisioner-container-v2.6.8-1\nvirt-cdi-uploadserver-container-v2.6.8-1\ncnv-containernetworking-plugins-container-v2.6.8-1\nvirtio-win-container-v2.6.8-2\nvirt-cdi-controller-container-v2.6.8-1\nvirt-cdi-importer-container-v2.6.8-1\nvirt-cdi-apiserver-container-v2.6.8-1\nvirt-cdi-operator-container-v2.6.8-1\nbridge-marker-container-v2.6.8-1\nhyperconverged-cluster-operator-container-v2.6.8-1\ncnv-must-gather-container-v2.6.8-5\nvirt-launcher-container-v2.6.8-5\nvirt-operator-container-v2.6.8-5\nvirt-api-container-v2.6.8-5\nvirt-controller-container-v2.6.8-5\nvirt-handler-container-v2.6.8-5\nhco-bundle-registry-container-v2.6.8-23\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4725",
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1998844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998844"
},
{
"category": "external",
"summary": "2008522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008522"
},
{
"category": "external",
"summary": "2010334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010334"
},
{
"category": "external",
"summary": "2012328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012328"
},
{
"category": "external",
"summary": "2013494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013494"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4725.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update",
"tracking": {
"current_release_date": "2025-11-27T23:53:34+00:00",
"generator": {
"date": "2025-11-27T23:53:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2021:4725",
"initial_release_date": "2021-11-17T18:39:29+00:00",
"revision_history": [
{
"date": "2021-11-17T18:39:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-17T18:39:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.8-2"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.8-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.8-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.8-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.8-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64"
],
"known_not_affected": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T18:39:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T18:39:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2022_0557
Vulnerability from csaf_redhat - Published: 2022-02-23 12:47 - Updated: 2024-12-17 21:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0557",
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0557.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update",
"tracking": {
"current_release_date": "2024-12-17T21:54:31+00:00",
"generator": {
"date": "2024-12-17T21:54:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0557",
"initial_release_date": "2022-02-23T12:47:14+00:00",
"revision_history": [
{
"date": "2022-02-23T12:47:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-23T12:47:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:54:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.9",
"product": {
"name": "Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.9::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.9",
"product": {
"name": "Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"product": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"product": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.src",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.src",
"product_id": "cri-tools-0:1.22.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"product": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.src",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.src",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.x86_64",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.x86_64",
"product_id": "cri-tools-0:1.22.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product": {
"name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_id": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-ansible-test@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"product": {
"name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"product_id": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-redistributable@0.13.1-2.rhaos4.9.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.aarch64",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.aarch64",
"product_id": "cri-tools-0:1.22.0-2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.ppc64le",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.ppc64le",
"product_id": "cri-tools-0:1.22.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"product": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_id": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"product": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"product": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-0:1.22.0-2.el8.s390x",
"product": {
"name": "cri-tools-0:1.22.0-2.el8.s390x",
"product_id": "cri-tools-0:1.22.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"product": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"product_id": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"product": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"product": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src"
},
"product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch"
},
"product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src"
},
"product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch"
},
"product_reference": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64"
},
"product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64"
},
"product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64"
},
"product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch"
},
"product_reference": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64"
},
"product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64"
},
"product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64"
},
"product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64"
},
"product_reference": "cri-tools-0:1.22.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64"
},
"product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64"
},
"product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
},
"product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
},
"product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src"
},
"product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.src",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64"
},
"product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
},
"product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
},
{
"cve": "CVE-2021-44717",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030806"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: syscall: don\u0027t close fd 0 on ForkExec error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"known_not_affected": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44717"
},
{
"category": "external",
"summary": "RHBZ#2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:47:14+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "workaround",
"details": "This bug can be mitigated by raising the per-process file descriptor limit.",
"product_ids": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src",
"8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x",
"8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src",
"8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src",
"8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x",
"8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src",
"8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src",
"8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x",
"8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x",
"8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: syscall: don\u0027t close fd 0 on ForkExec error"
}
]
}
RHSA-2022_0431
Vulnerability from csaf_redhat - Published: 2022-02-03 15:13 - Updated: 2024-12-17 21:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS). The updated image includes a bug fixes, security patches and new feature enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "New features\n1. Vulnerability triage workflows - RHACS 3.68 includes the ability to triage vulnerabilities in a variety of ways to support your vulnerability management process. See Managing vulnerabilities for more information.\n2. Report scheduling for vulnerabilities - RHACS 3.68 includes the ability to schedule reports for vulnerabilities helping you to send scheduled communications to key stakeholders to assist in the vulnerability management process. See Reporting vulnerabilities to teams for more information.\n3. Use AWS ECR AssumeRoles - AWS AssumeRoles allows you to define roles with specific permissions and then granting users access to those roles. {product-title} 3.68 includes the ability to use AWS ECR AssumeRoles to configure roles and grant various levels of access to users. For more details, see Using assumerole with Amazon ECR.\n\nImportant bug fixes\n\n1. Previously, searching for CVE\u2019s with a specific severity did not returned any results. This issue has been fixed.\n2. Previously, when configuring the Manage Watches feature, if you added more than 12 images to the watch list, the image list would not display properly. This issue has been fixed.\n3. Previously, when the RHACS Operator accessed the central-htpasswd secret, it would create a false positive policy violation for the OpenShift: Advanced Cluster Security Central Admin Secret Accessed default policy. This issue has been fixed.\n\nSecurity update\n\n1. In earlier versions of RHACS, the write permission for the APIToken resource allowed users to create API tokens for any role, including the admin role. This issue has been fixed.\n2. The scanner image has been updated to patch CVE-2021-29923.\n* golang: net: incorrect parsing of extraneous zero characters at the\nbeginning of an IP address octet (CVE-2021-29923)\n\nImportant system changes\n\n1. RHACS 3.68 includes updates for the Log4Shell vulnerability detection policy. With this update this policy also detects CVE-2021-45046 and it includes the updated remediation based on the latest guidance by the Apache Logging security team.\n2. When you upgrade to RHACS 3.68, roles that include write access on the Images resource will have write permissions for both VulnerabilityManagementRequests and VulnerabilityManagementApprovals resource. Red Hat recommends updating the roles to only include the least amount of resources required for each role.\n3. If you have installed RHACS using Helm, this update disabled the cluster configuration options in the {product-title-short} portal. You can continue to use Helm configuration files.\n4. RHACS 3.68 sends notifications for every runtime policy violation rather than sending notifications only the first encountered violation. This is the default behavior. \n5. Tags of the scanner, scanner-db, and collector images, including the collector-slim variant, are now identical to the main image tag. \n6. Red Has changed the image names for collector-slim. -slim is no longer part of the image tag. \n7. The roxctl CLI includes a new --image-defaults option for the roxctl helm output and roxctl central generate commands. It allows selecting the default registry from which container images are taken for deploying central and scanner.\n8. Red Hat has deprecated the --rhacs option for the roxctl helm output command. Use --rhacs-image-defaults option instead.\n9. By default, the roxctl helm output command now uses the images from registry.redhat.io rather than stackrox.io.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0431",
"url": "https://access.redhat.com/errata/RHSA-2022:0431"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "ROX-9334",
"url": "https://issues.redhat.com/browse/ROX-9334"
},
{
"category": "external",
"summary": "ROX-9362",
"url": "https://issues.redhat.com/browse/ROX-9362"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0431.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.68 security and enhancement update",
"tracking": {
"current_release_date": "2024-12-17T21:54:15+00:00",
"generator": {
"date": "2024-12-17T21:54:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0431",
"initial_release_date": "2022-02-03T15:13:02+00:00",
"revision_history": [
{
"date": "2022-02-03T15:13:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-03T15:13:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:54:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHACS 3.68 for RHEL 8",
"product": {
"name": "RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:advanced_cluster_security:3.68::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Security for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=3.68.0-6"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=3.68.0-2"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"product_id": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-docs-rhel8\u0026tag=3.68.0-5"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=3.68.0-28"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.68.0-8"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.68.0-5"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=3.68.0-5"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=3.68.0-6"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=3.68.0-6"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T15:13:02+00:00",
"details": "To take advantage of the new features, bug fixes and security patches issued in 3.68 you are advised to upgrade to patch release 3.68.0.",
"product_ids": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0431"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022_1372
Vulnerability from csaf_redhat - Published: 2022-04-13 18:48 - Updated: 2024-12-17 21:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images that include numerous enhancements, security, and bug fixes\nare now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nBug Fix(es):\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\nor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1372",
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1898988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898988"
},
{
"category": "external",
"summary": "1954708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954708"
},
{
"category": "external",
"summary": "1956418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956418"
},
{
"category": "external",
"summary": "1970123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970123"
},
{
"category": "external",
"summary": "1972190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972190"
},
{
"category": "external",
"summary": "1974344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974344"
},
{
"category": "external",
"summary": "1981341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981341"
},
{
"category": "external",
"summary": "1981694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981694"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1991462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991462"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "1996830",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996830"
},
{
"category": "external",
"summary": "1996833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996833"
},
{
"category": "external",
"summary": "1999689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999689"
},
{
"category": "external",
"summary": "1999952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999952"
},
{
"category": "external",
"summary": "2003532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003532"
},
{
"category": "external",
"summary": "2005801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005801"
},
{
"category": "external",
"summary": "2005919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005919"
},
{
"category": "external",
"summary": "2021313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021313"
},
{
"category": "external",
"summary": "2022424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022424"
},
{
"category": "external",
"summary": "2022693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022693"
},
{
"category": "external",
"summary": "2024107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024107"
},
{
"category": "external",
"summary": "2024545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024545"
},
{
"category": "external",
"summary": "2026007",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026007"
},
{
"category": "external",
"summary": "2027666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027666"
},
{
"category": "external",
"summary": "2027826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027826"
},
{
"category": "external",
"summary": "2028559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028559"
},
{
"category": "external",
"summary": "2029413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029413"
},
{
"category": "external",
"summary": "2030602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030602"
},
{
"category": "external",
"summary": "2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "2030839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030839"
},
{
"category": "external",
"summary": "2031023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031023"
},
{
"category": "external",
"summary": "2031705",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031705"
},
{
"category": "external",
"summary": "2032404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032404"
},
{
"category": "external",
"summary": "2032412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032412"
},
{
"category": "external",
"summary": "2032656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032656"
},
{
"category": "external",
"summary": "2032969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032969"
},
{
"category": "external",
"summary": "2032984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032984"
},
{
"category": "external",
"summary": "2033251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033251"
},
{
"category": "external",
"summary": "2034003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034003"
},
{
"category": "external",
"summary": "2034805",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034805"
},
{
"category": "external",
"summary": "2034904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034904"
},
{
"category": "external",
"summary": "2035774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035774"
},
{
"category": "external",
"summary": "2035995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035995"
},
{
"category": "external",
"summary": "2036018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036018"
},
{
"category": "external",
"summary": "2036211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036211"
},
{
"category": "external",
"summary": "2037279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037279"
},
{
"category": "external",
"summary": "2037318",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037318"
},
{
"category": "external",
"summary": "2037497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037497"
},
{
"category": "external",
"summary": "2038884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038884"
},
{
"category": "external",
"summary": "2039240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039240"
},
{
"category": "external",
"summary": "2040682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040682"
},
{
"category": "external",
"summary": "2041507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041507"
},
{
"category": "external",
"summary": "2042866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042866"
},
{
"category": "external",
"summary": "2043017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043017"
},
{
"category": "external",
"summary": "2043028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043028"
},
{
"category": "external",
"summary": "2043406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043406"
},
{
"category": "external",
"summary": "2043513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043513"
},
{
"category": "external",
"summary": "2044447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044447"
},
{
"category": "external",
"summary": "2044823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044823"
},
{
"category": "external",
"summary": "2045084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045084"
},
{
"category": "external",
"summary": "2046186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046186"
},
{
"category": "external",
"summary": "2046254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046254"
},
{
"category": "external",
"summary": "2046677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046677"
},
{
"category": "external",
"summary": "2046766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046766"
},
{
"category": "external",
"summary": "2046887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046887"
},
{
"category": "external",
"summary": "2047162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047162"
},
{
"category": "external",
"summary": "2047201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047201"
},
{
"category": "external",
"summary": "2047562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047562"
},
{
"category": "external",
"summary": "2047565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047565"
},
{
"category": "external",
"summary": "2047625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047625"
},
{
"category": "external",
"summary": "2047632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047632"
},
{
"category": "external",
"summary": "2047642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047642"
},
{
"category": "external",
"summary": "2048107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048107"
},
{
"category": "external",
"summary": "2048370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048370"
},
{
"category": "external",
"summary": "2048458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048458"
},
{
"category": "external",
"summary": "2049029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049029"
},
{
"category": "external",
"summary": "2049075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049075"
},
{
"category": "external",
"summary": "2049081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049081"
},
{
"category": "external",
"summary": "2049424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049424"
},
{
"category": "external",
"summary": "2049509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049509"
},
{
"category": "external",
"summary": "2049718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049718"
},
{
"category": "external",
"summary": "2049727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049727"
},
{
"category": "external",
"summary": "2049771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049771"
},
{
"category": "external",
"summary": "2049790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049790"
},
{
"category": "external",
"summary": "2050056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050056"
},
{
"category": "external",
"summary": "2050142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050142"
},
{
"category": "external",
"summary": "2050402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050402"
},
{
"category": "external",
"summary": "2050483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050483"
},
{
"category": "external",
"summary": "2051249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051249"
},
{
"category": "external",
"summary": "2051406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051406"
},
{
"category": "external",
"summary": "2051599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051599"
},
{
"category": "external",
"summary": "2051913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051913"
},
{
"category": "external",
"summary": "2052027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052027"
},
{
"category": "external",
"summary": "2052438",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052438"
},
{
"category": "external",
"summary": "2052937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052937"
},
{
"category": "external",
"summary": "2052996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052996"
},
{
"category": "external",
"summary": "2053156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053156"
},
{
"category": "external",
"summary": "2053517",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053517"
},
{
"category": "external",
"summary": "2054147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054147"
},
{
"category": "external",
"summary": "2054755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054755"
},
{
"category": "external",
"summary": "2061251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061251"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1372.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security \u0026 bug fix update",
"tracking": {
"current_release_date": "2024-12-17T21:55:29+00:00",
"generator": {
"date": "2024-12-17T21:55:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:1372",
"initial_release_date": "2022-04-13T18:48:58+00:00",
"revision_history": [
{
"date": "2022-04-13T18:48:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-13T18:48:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:55:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHODF 4.10 for RHEL 8",
"product": {
"name": "RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_data_foundation:4.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Data Foundation"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"product": {
"name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"product_id": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"product": {
"name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"product_id": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"product_id": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"product": {
"name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"product_id": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"product": {
"name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"product_id": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"product_id": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"product": {
"name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"product_id": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"product": {
"name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"product_id": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"product": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"product": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"product": {
"name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"product_id": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"product": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"product_id": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"product": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"product_id": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"product": {
"name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"product_id": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"product": {
"name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"product_id": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"product": {
"name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"product_id": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"product_id": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"product": {
"name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"product_id": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"product": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"product_id": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"product": {
"name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"product_id": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"product": {
"name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"product_id": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"product": {
"name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"product_id": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"product_id": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"product": {
"name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"product_id": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"product": {
"name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"product_id": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"product_id": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"product": {
"name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"product_id": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"product": {
"name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"product_id": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"product": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"product": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"product": {
"name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"product_id": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"product": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"product_id": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"product": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"product_id": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"product": {
"name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"product_id": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"product": {
"name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"product_id": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"product": {
"name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"product_id": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"product_id": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"product": {
"name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"product_id": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"product": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"product_id": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"product": {
"name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"product_id": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"product": {
"name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"product_id": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"product": {
"name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"product_id": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"product_id": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"product": {
"name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"product_id": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"product": {
"name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"product_id": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"product_id": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"product": {
"name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"product_id": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"product": {
"name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"product_id": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"product": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"product": {
"name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"product_id": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"product": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"product_id": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"product": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"product_id": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"product": {
"name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"product_id": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"product": {
"name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"product_id": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"product": {
"name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"product_id": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"product_id": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"product": {
"name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"product_id": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"product": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"product_id": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"product": {
"name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"product_id": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x"
},
"product_reference": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64"
},
"product_reference": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le"
},
"product_reference": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64"
},
"product_reference": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le"
},
"product_reference": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x"
},
"product_reference": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le"
},
"product_reference": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x"
},
"product_reference": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64"
},
"product_reference": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le"
},
"product_reference": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64"
},
"product_reference": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x"
},
"product_reference": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64"
},
"product_reference": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x"
},
"product_reference": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le"
},
"product_reference": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le"
},
"product_reference": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x"
},
"product_reference": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64"
},
"product_reference": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64"
},
"product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x"
},
"product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x"
},
"product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le"
},
"product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64"
},
"product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64"
},
"product_reference": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x"
},
"product_reference": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le"
},
"product_reference": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x"
},
"product_reference": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le"
},
"product_reference": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64"
},
"product_reference": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le"
},
"product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64"
},
"product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x"
},
"product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x"
},
"product_reference": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le"
},
"product_reference": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64"
},
"product_reference": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le"
},
"product_reference": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64"
},
"product_reference": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x"
},
"product_reference": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64"
},
"product_reference": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le"
},
"product_reference": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x"
},
"product_reference": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64"
},
"product_reference": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x"
},
"product_reference": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le"
},
"product_reference": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x"
},
"product_reference": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64"
},
"product_reference": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le"
},
"product_reference": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le"
},
"product_reference": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x"
},
"product_reference": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"relates_to_product_reference": "8Base-RHODF-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64 as a component of RHODF 4.10 for RHEL 8",
"product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
},
"product_reference": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64",
"relates_to_product_reference": "8Base-RHODF-4.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-43565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-12-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030787"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: empty plaintext packet causes panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43565"
},
{
"category": "external",
"summary": "RHBZ#2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565"
}
],
"release_date": "2021-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/crypto: empty plaintext packet causes panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
},
{
"cve": "CVE-2021-44717",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030806"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: syscall: don\u0027t close fd 0 on ForkExec error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44717"
},
{
"category": "external",
"summary": "RHBZ#2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-13T18:48:58+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "workaround",
"details": "This bug can be mitigated by raising the per-process file descriptor limit.",
"product_ids": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64",
"8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64",
"8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x",
"8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64",
"8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64",
"8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x",
"8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x",
"8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le",
"8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le",
"8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64",
"8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le",
"8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64",
"8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le",
"8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x",
"8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le",
"8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x",
"8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64",
"8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x",
"8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: syscall: don\u0027t close fd 0 on ForkExec error"
}
]
}
RHSA-2022:0577
Vulnerability from csaf_redhat - Published: 2022-03-28 09:34 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0577",
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "1990573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990573"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1992841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992841"
},
{
"category": "external",
"summary": "1994859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994859"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "2000772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000772"
},
{
"category": "external",
"summary": "2001547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001547"
},
{
"category": "external",
"summary": "2002961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002961"
},
{
"category": "external",
"summary": "2005360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005360"
},
{
"category": "external",
"summary": "2008601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008601"
},
{
"category": "external",
"summary": "2015772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015772"
},
{
"category": "external",
"summary": "2032048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032048"
},
{
"category": "external",
"summary": "WINC-747",
"url": "https://issues.redhat.com/browse/WINC-747"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0577.json"
}
],
"title": "Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]",
"tracking": {
"current_release_date": "2025-11-27T23:53:41+00:00",
"generator": {
"date": "2025-11-27T23:53:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:0577",
"initial_release_date": "2022-03-28T09:34:15+00:00",
"revision_history": [
{
"date": "2022-03-28T09:34:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-28T09:34:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.10",
"product": {
"name": "Red Hat OpenShift Container Platform 4.10",
"product_id": "8Base-RHOSE-4.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"product": {
"name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"product_id": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"product_identification_helper": {
"purl": "pkg:oci/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle\u0026tag=v5.0.0-5"
}
}
},
{
"category": "product_version",
"name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"product": {
"name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"product_id": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator\u0026tag=5.0.0-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64 as a component of Red Hat OpenShift Container Platform 4.10",
"product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64"
},
"product_reference": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64 as a component of Red Hat OpenShift Container Platform 4.10",
"product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
},
"product_reference": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28851",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28851"
},
{
"category": "external",
"summary": "RHBZ#1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension"
},
{
"cve": "CVE-2020-28852",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28852"
},
{
"category": "external",
"summary": "RHBZ#1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-31525",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1958341"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31525"
},
{
"category": "external",
"summary": "RHBZ#1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc",
"url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc"
}
],
"release_date": "2021-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header"
},
{
"cve": "CVE-2021-33195",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989564"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: lookup functions may return invalid host names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "RHBZ#1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: lookup functions may return invalid host names"
},
{
"cve": "CVE-2021-33197",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "RHBZ#1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty"
},
{
"cve": "CVE-2021-33198",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989575"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33198"
},
{
"category": "external",
"summary": "RHBZ#1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
}
]
}
RHSA-2022:0989
Vulnerability from csaf_redhat - Published: 2022-03-24 10:58 - Updated: 2025-11-21 18:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-qpid-apache is now available for Red Hat OpenStack\nPlatform 16.1 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Golang binding library for qpid-proton\n\nSecurity Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0989",
"url": "https://access.redhat.com/errata/RHSA-2022:0989"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0989.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update",
"tracking": {
"current_release_date": "2025-11-21T18:29:24+00:00",
"generator": {
"date": "2025-11-21T18:29:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0989",
"initial_release_date": "2022-03-24T10:58:33+00:00",
"revision_history": [
{
"date": "2022-03-24T10:58:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-24T10:58:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:29:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.1",
"product": {
"name": "Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
},
"product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-24T10:58:33+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0989"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src",
"8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022_0260
Vulnerability from csaf_redhat - Published: 2022-01-25 13:55 - Updated: 2024-12-17 21:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0260",
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0260.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update",
"tracking": {
"current_release_date": "2024-12-17T21:53:41+00:00",
"generator": {
"date": "2024-12-17T21:53:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0260",
"initial_release_date": "2022-01-25T13:55:40+00:00",
"revision_history": [
{
"date": "2022-01-25T13:55:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-25T13:55:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:53:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.1",
"product": {
"name": "Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.src",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.src",
"product_id": "etcd-0:3.3.23-7.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.src as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-25T13:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-25T13:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-25T13:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
}
]
}
RHSA-2021_4725
Vulnerability from csaf_redhat - Published: 2021-11-17 18:39 - Updated: 2024-12-17 21:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.8 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-v2v-conversion-container-v2.6.8-1\nhyperconverged-cluster-webhook-container-v2.6.8-1\nvm-import-controller-container-v2.6.8-1\nkubevirt-cpu-model-nfd-plugin-container-v2.6.8-2\nvm-import-operator-container-v2.6.8-1\nkubevirt-cpu-node-labeller-container-v2.6.8-1\nkubevirt-ssp-operator-container-v2.6.8-1\nkubemacpool-container-v2.6.8-1\ncluster-network-addons-operator-container-v2.6.8-1\nvirt-cdi-cloner-container-v2.6.8-1\nvirt-cdi-uploadproxy-container-v2.6.8-1\nkubernetes-nmstate-handler-container-v2.6.8-1\novs-cni-plugin-container-v2.6.8-1\novs-cni-marker-container-v2.6.8-1\nhostpath-provisioner-operator-container-v2.6.8-1\nkubevirt-vmware-container-v2.6.8-2\nkubevirt-template-validator-container-v2.6.8-2\nkubevirt-kvm-info-nfd-plugin-container-v2.6.8-1\nnode-maintenance-operator-container-v2.6.8-1\nvm-import-virtv2v-container-v2.6.8-1\nhostpath-provisioner-container-v2.6.8-1\nvirt-cdi-uploadserver-container-v2.6.8-1\ncnv-containernetworking-plugins-container-v2.6.8-1\nvirtio-win-container-v2.6.8-2\nvirt-cdi-controller-container-v2.6.8-1\nvirt-cdi-importer-container-v2.6.8-1\nvirt-cdi-apiserver-container-v2.6.8-1\nvirt-cdi-operator-container-v2.6.8-1\nbridge-marker-container-v2.6.8-1\nhyperconverged-cluster-operator-container-v2.6.8-1\ncnv-must-gather-container-v2.6.8-5\nvirt-launcher-container-v2.6.8-5\nvirt-operator-container-v2.6.8-5\nvirt-api-container-v2.6.8-5\nvirt-controller-container-v2.6.8-5\nvirt-handler-container-v2.6.8-5\nhco-bundle-registry-container-v2.6.8-23\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4725",
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1998844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998844"
},
{
"category": "external",
"summary": "2008522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008522"
},
{
"category": "external",
"summary": "2010334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010334"
},
{
"category": "external",
"summary": "2012328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012328"
},
{
"category": "external",
"summary": "2013494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013494"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4725.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update",
"tracking": {
"current_release_date": "2024-12-17T21:52:36+00:00",
"generator": {
"date": "2024-12-17T21:52:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:4725",
"initial_release_date": "2021-11-17T18:39:29+00:00",
"revision_history": [
{
"date": "2021-11-17T18:39:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-17T18:39:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:52:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 2.6 for RHEL 8",
"product": {
"name": "CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.8-2"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.8-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.8-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_id": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.8-1"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.8-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64 as a component of CNV 2.6 for RHEL 8",
"product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
},
"product_reference": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"relates_to_product_reference": "8Base-CNV-2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64"
],
"known_not_affected": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T18:39:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-17T18:39:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64",
"8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64",
"8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2022:0998
Vulnerability from csaf_redhat - Published: 2022-03-23 22:12 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-vbatts-tar-split is now available for Red Hat\nOpenStack Platform 16.2 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0998",
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0998.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update",
"tracking": {
"current_release_date": "2025-11-27T23:53:43+00:00",
"generator": {
"date": "2025-11-27T23:53:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:0998",
"initial_release_date": "2022-03-23T22:12:28+00:00",
"revision_history": [
{
"date": "2022-03-23T22:12:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-23T22:12:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-23T22:12:28+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-23T22:12:28+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2022:0318
Vulnerability from csaf_redhat - Published: 2022-01-27 16:52 - Updated: 2025-11-21 18:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Openshift distributed tracing 2.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift distributed Tracing provides these changes:\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThe Red Hat OpenShift distributed tracing release notes provide information on\nthe features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0318",
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "TRACING-2235",
"url": "https://issues.redhat.com/browse/TRACING-2235"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0318.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update",
"tracking": {
"current_release_date": "2025-11-21T18:28:16+00:00",
"generator": {
"date": "2025-11-21T18:28:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0318",
"initial_release_date": "2022-01-27T16:52:20+00:00",
"revision_history": [
{
"date": "2022-01-27T16:52:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-28T15:04:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:28:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 2.1",
"product": {
"name": "Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:2.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-27T16:52:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-27T16:52:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
}
]
}
RHSA-2022:0988
Vulnerability from csaf_redhat - Published: 2022-03-24 10:59 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-vbatts-tar-split is now available for Red Hat\nOpenStack Platform 16.1 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0988",
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2020629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020629"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0988.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update",
"tracking": {
"current_release_date": "2025-11-27T23:53:41+00:00",
"generator": {
"date": "2025-11-27T23:53:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:0988",
"initial_release_date": "2022-03-24T10:59:08+00:00",
"revision_history": [
{
"date": "2022-03-24T10:59:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-24T10:59:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.1",
"product": {
"name": "Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
},
"product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-24T10:59:08+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-24T10:59:08+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src",
"8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
}
]
}
RHSA-2022:1276
Vulnerability from csaf_redhat - Published: 2022-04-07 18:02 - Updated: 2025-11-27 11:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 2.0.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)\n\n* envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)\n\n* istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)\n\n* envoy: Use-after-free when response filters increase response data (CVE-2021-43825)\n\n* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)\n\n* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)\n\n* istio: unauthenticated control plane denial of service attack (CVE-2022-23635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1276",
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1954368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "2050744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744"
},
{
"category": "external",
"summary": "2050746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746"
},
{
"category": "external",
"summary": "2050748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748"
},
{
"category": "external",
"summary": "2050753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753"
},
{
"category": "external",
"summary": "2050757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757"
},
{
"category": "external",
"summary": "2050758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758"
},
{
"category": "external",
"summary": "2057277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277"
},
{
"category": "external",
"summary": "2061638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1276.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update",
"tracking": {
"current_release_date": "2025-11-27T11:56:31+00:00",
"generator": {
"date": "2025-11-27T11:56:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:1276",
"initial_release_date": "2022-04-07T18:02:07+00:00",
"revision_history": [
{
"date": "2022-04-07T18:02:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-07T18:02:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T11:56:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 2.0",
"product": {
"name": "OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.src",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.src",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.src",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.src",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.src",
"product_id": "servicemesh-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.src",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.src",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"product": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"product_id": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"product": {
"name": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"product_id": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
},
"product_reference": "kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-mixc-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-mixs-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
},
"product_reference": "servicemesh-proxy-0:2.0.9-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28851",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28851"
},
{
"category": "external",
"summary": "RHBZ#1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension"
},
{
"cve": "CVE-2020-28852",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28852"
},
{
"category": "external",
"summary": "RHBZ#1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"cve": "CVE-2021-3749",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999784"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-axios: Regular expression denial of service in trim function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3749"
},
{
"category": "external",
"summary": "RHBZ#1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929",
"url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31",
"url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31"
}
],
"release_date": "2021-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-axios: Regular expression denial of service in trim function"
},
{
"cve": "CVE-2021-29482",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-04-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1954368"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/ulikunitz/xz. The function readUvarint may not terminate a loop what could lead to denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth authentication, therefore the impact is low.\nIn OCP before 4.7 the buildah, skopeo and podman packages include vulnerable version of github.com/ulikunitz/xz, but these OCP releases are already in the Maintenance Phase of the support, hence affected components are marked as wontfix. This may be fixed in the future.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29482"
},
{
"category": "external",
"summary": "RHBZ#1954368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482"
}
],
"release_date": "2020-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service"
},
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-43565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-12-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030787"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto: empty plaintext packet causes panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43565"
},
{
"category": "external",
"summary": "RHBZ#2030787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565"
}
],
"release_date": "2021-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/crypto: empty plaintext packet causes panic"
},
{
"cve": "CVE-2021-43824",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. A crafted request can potentially trigger a NULL pointer dereference when using a WT filter safe_regex match.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Null pointer dereference when using JWT filter safe_regex match",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43824"
},
{
"category": "external",
"summary": "RHBZ#2050744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Null pointer dereference when using JWT filter safe_regex match"
},
{
"cve": "CVE-2021-43825",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050746"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. If the amount of buffered data by envoy goes over the limit, the buffer may overflow while a response is being processed by the filter chain. This issue possibly causes the operation to abort incorrectly, resulting in the access of a freed memory block.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Use-after-free when response filters increase response data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43825"
},
{
"category": "external",
"summary": "RHBZ#2050746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Use-after-free when response filters increase response data"
},
{
"cve": "CVE-2021-43826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050748"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. If a downstream source disconnects during upstream connection establishment when tunneling TCP over HTTP, a use-after-free can occur, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Use-after-free when tunneling TCP over HTTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43826"
},
{
"category": "external",
"summary": "RHBZ#2050748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Use-after-free when tunneling TCP over HTTP"
},
{
"cve": "CVE-2022-21654",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050753"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. When certificate validation settings are changed, incorrect configuration handling allows TLS session reuse without revalidation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21654"
},
{
"category": "external",
"summary": "RHBZ#2050753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21654",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21654"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation"
},
{
"cve": "CVE-2022-21655",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. Due to incorrect handling of the common router, a segfault is possible when internal redirects are routes with a direct response entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Incorrect handling of internal redirects to routes with a direct response entry",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21655"
},
{
"category": "external",
"summary": "RHBZ#2050757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "envoy: Incorrect handling of internal redirects to routes with a direct response entry"
},
{
"cve": "CVE-2022-23606",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-02-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2050758"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in envoy. When a cluster is deleted via the Cluster Discovery Service, a stack exhaustion may occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23606"
},
{
"category": "external",
"summary": "RHBZ#2050758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23606"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606"
},
{
"category": "external",
"summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf",
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf"
}
],
"release_date": "2022-02-22T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service"
},
{
"cve": "CVE-2022-23635",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2022-02-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2057277"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in istio. This flaw allows an attacker to send a specially crafted message to isitiod, causing the control plane to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "istio: unauthenticated control plane denial of service attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-23635"
},
{
"category": "external",
"summary": "RHBZ#2057277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-23635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635"
},
{
"category": "external",
"summary": "https://istio.io/latest/news/security/istio-security-2022-003",
"url": "https://istio.io/latest/news/security/istio-security-2022-003"
}
],
"release_date": "2022-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "istio: unauthenticated control plane denial of service attack"
},
{
"acknowledgments": [
{
"names": [
"Oliver Liu, John Howard and Jacob Delgado"
],
"organization": "Istio Product Security Working Group",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2022-24726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061638"
}
],
"notes": [
{
"category": "description",
"text": "A stack exhaustion flaw was found in the Istio control plane. This flaw allows a remote unauthenticated attacker to send a specially crafted or oversized message to crash the control plane process, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24726"
},
{
"category": "external",
"summary": "RHBZ#2061638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726"
},
{
"category": "external",
"summary": "https://istio.io/latest/news/security/istio-security-2022-004/",
"url": "https://istio.io/latest/news/security/istio-security-2022-004/"
}
],
"release_date": "2022-03-09T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-07T18:02:07+00:00",
"details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion"
}
]
}
RHSA-2022:0260
Vulnerability from csaf_redhat - Published: 2022-01-25 13:55 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0260",
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0260.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update",
"tracking": {
"current_release_date": "2025-11-27T23:53:41+00:00",
"generator": {
"date": "2025-11-27T23:53:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:0260",
"initial_release_date": "2022-01-25T13:55:40+00:00",
"revision_history": [
{
"date": "2022-01-25T13:55:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-25T13:55:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.1",
"product": {
"name": "Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.src",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.src",
"product_id": "etcd-0:3.3.23-7.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.src as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1",
"product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-25T13:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-25T13:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-25T13:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
}
]
}
RHSA-2022:0431
Vulnerability from csaf_redhat - Published: 2022-02-03 15:13 - Updated: 2025-11-21 18:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS). The updated image includes a bug fixes, security patches and new feature enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "New features\n1. Vulnerability triage workflows - RHACS 3.68 includes the ability to triage vulnerabilities in a variety of ways to support your vulnerability management process. See Managing vulnerabilities for more information.\n2. Report scheduling for vulnerabilities - RHACS 3.68 includes the ability to schedule reports for vulnerabilities helping you to send scheduled communications to key stakeholders to assist in the vulnerability management process. See Reporting vulnerabilities to teams for more information.\n3. Use AWS ECR AssumeRoles - AWS AssumeRoles allows you to define roles with specific permissions and then granting users access to those roles. {product-title} 3.68 includes the ability to use AWS ECR AssumeRoles to configure roles and grant various levels of access to users. For more details, see Using assumerole with Amazon ECR.\n\nImportant bug fixes\n\n1. Previously, searching for CVE\u2019s with a specific severity did not returned any results. This issue has been fixed.\n2. Previously, when configuring the Manage Watches feature, if you added more than 12 images to the watch list, the image list would not display properly. This issue has been fixed.\n3. Previously, when the RHACS Operator accessed the central-htpasswd secret, it would create a false positive policy violation for the OpenShift: Advanced Cluster Security Central Admin Secret Accessed default policy. This issue has been fixed.\n\nSecurity update\n\n1. In earlier versions of RHACS, the write permission for the APIToken resource allowed users to create API tokens for any role, including the admin role. This issue has been fixed.\n2. The scanner image has been updated to patch CVE-2021-29923.\n* golang: net: incorrect parsing of extraneous zero characters at the\nbeginning of an IP address octet (CVE-2021-29923)\n\nImportant system changes\n\n1. RHACS 3.68 includes updates for the Log4Shell vulnerability detection policy. With this update this policy also detects CVE-2021-45046 and it includes the updated remediation based on the latest guidance by the Apache Logging security team.\n2. When you upgrade to RHACS 3.68, roles that include write access on the Images resource will have write permissions for both VulnerabilityManagementRequests and VulnerabilityManagementApprovals resource. Red Hat recommends updating the roles to only include the least amount of resources required for each role.\n3. If you have installed RHACS using Helm, this update disabled the cluster configuration options in the {product-title-short} portal. You can continue to use Helm configuration files.\n4. RHACS 3.68 sends notifications for every runtime policy violation rather than sending notifications only the first encountered violation. This is the default behavior. \n5. Tags of the scanner, scanner-db, and collector images, including the collector-slim variant, are now identical to the main image tag. \n6. Red Has changed the image names for collector-slim. -slim is no longer part of the image tag. \n7. The roxctl CLI includes a new --image-defaults option for the roxctl helm output and roxctl central generate commands. It allows selecting the default registry from which container images are taken for deploying central and scanner.\n8. Red Hat has deprecated the --rhacs option for the roxctl helm output command. Use --rhacs-image-defaults option instead.\n9. By default, the roxctl helm output command now uses the images from registry.redhat.io rather than stackrox.io.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0431",
"url": "https://access.redhat.com/errata/RHSA-2022:0431"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "ROX-9334",
"url": "https://issues.redhat.com/browse/ROX-9334"
},
{
"category": "external",
"summary": "ROX-9362",
"url": "https://issues.redhat.com/browse/ROX-9362"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0431.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.68 security and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:28:29+00:00",
"generator": {
"date": "2025-11-21T18:28:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0431",
"initial_release_date": "2022-02-03T15:13:02+00:00",
"revision_history": [
{
"date": "2022-02-03T15:13:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-03T15:13:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:28:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHACS 3.68 for RHEL 8",
"product": {
"name": "RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:advanced_cluster_security:3.68::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Security for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=3.68.0-6"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=3.68.0-2"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"product_id": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-docs-rhel8\u0026tag=3.68.0-5"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=3.68.0-28"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.68.0-8"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.68.0-5"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=3.68.0-5"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=3.68.0-6"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=3.68.0-6"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64 as a component of RHACS 3.68 for RHEL 8",
"product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64",
"relates_to_product_reference": "8Base-RHACS-3.68"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T15:13:02+00:00",
"details": "To take advantage of the new features, bug fixes and security patches issued in 3.68 you are advised to upgrade to patch release 3.68.0.",
"product_ids": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0431"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022:0432
Vulnerability from csaf_redhat - Published: 2022-02-03 16:10 - Updated: 2025-11-21 18:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Release of OpenShift Serverless Client kn 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Serverless Client kn 1.20.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.20.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0432",
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "2024823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024823"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0432.json"
}
],
"title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0",
"tracking": {
"current_release_date": "2025-11-21T18:28:29+00:00",
"generator": {
"date": "2025-11-21T18:28:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0432",
"initial_release_date": "2022-02-03T16:10:33+00:00",
"revision_history": [
{
"date": "2022-02-03T16:10:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-03T16:10:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:28:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Serverless 1.0",
"product": {
"name": "Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"product": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"product_id": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.src as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.src",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0",
"product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
},
"product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T16:10:33+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-38297",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2012887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: Command-line arguments may overwrite global data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38297"
},
{
"category": "external",
"summary": "RHBZ#2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A",
"url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A"
}
],
"release_date": "2021-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T16:10:33+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: Command-line arguments may overwrite global data"
},
{
"cve": "CVE-2021-39293",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2006044"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39293"
},
{
"category": "external",
"summary": "RHBZ#2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"release_date": "2021-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T16:10:33+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src",
"8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)"
}
]
}
RHSA-2021_4910
Vulnerability from csaf_redhat - Published: 2021-12-02 14:27 - Updated: 2024-12-17 21:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.8.3 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4910",
"url": "https://access.redhat.com/errata/RHSA-2021:4910"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2007344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4910.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update",
"tracking": {
"current_release_date": "2024-12-17T21:52:23+00:00",
"generator": {
"date": "2024-12-17T21:52:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2021:4910",
"initial_release_date": "2021-12-02T14:27:54+00:00",
"revision_history": [
{
"date": "2021-12-02T14:27:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-12-02T14:27:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:52:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.8 for RHEL 7",
"product": {
"name": "CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el7"
}
}
},
{
"category": "product_name",
"name": "CNV 4.8 for RHEL 8",
"product": {
"name": "CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-0:4.8.3-251.el7.src",
"product": {
"name": "kubevirt-0:4.8.3-251.el7.src",
"product_id": "kubevirt-0:4.8.3-251.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.8.3-251.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kubevirt-0:4.8.3-251.el8.src",
"product": {
"name": "kubevirt-0:4.8.3-251.el8.src",
"product_id": "kubevirt-0:4.8.3-251.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt@4.8.3-251.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"product_id": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.3-251.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.3-251.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"product_id": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.3-251.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"product": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"product_id": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.3-251.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.8.3-251.el7.src as a component of CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src"
},
"product_reference": "kubevirt-0:4.8.3-251.el7.src",
"relates_to_product_reference": "7Server-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64 as a component of CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64 as a component of CNV 4.8 for RHEL 7",
"product_id": "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"relates_to_product_reference": "7Server-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-0:4.8.3-251.el8.src as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src"
},
"product_reference": "kubevirt-0:4.8.3-251.el8.src",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64 as a component of CNV 4.8 for RHEL 8",
"product_id": "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
},
"product_reference": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64",
"relates_to_product_reference": "8Base-CNV-4.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-02T14:27:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4910"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src",
"7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64",
"7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64",
"8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src",
"8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64",
"8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
}
]
}
RHSA-2022:0947
Vulnerability from csaf_redhat - Published: 2022-03-16 15:45 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.10.0 images:\n\nRHEL-8-CNV-4.10\n\n==============\n\nkubevirt-velero-plugin-container-v4.10.0-8\nvirtio-win-container-v4.10.0-10\nkubevirt-template-validator-container-v4.10.0-16\nhostpath-csi-driver-container-v4.10.0-32\nhostpath-provisioner-container-v4.10.0-32\nhostpath-provisioner-operator-container-v4.10.0-62\ncnv-must-gather-container-v4.10.0-110\nvirt-cdi-controller-container-v4.10.0-90\nvirt-cdi-apiserver-container-v4.10.0-90\nvirt-cdi-uploadserver-container-v4.10.0-90\nvirt-cdi-uploadproxy-container-v4.10.0-90\nvirt-cdi-operator-container-v4.10.0-90\nvirt-cdi-cloner-container-v4.10.0-90\nvirt-cdi-importer-container-v4.10.0-90\nkubevirt-ssp-operator-container-v4.10.0-50\nvirt-api-container-v4.10.0-217\nhyperconverged-cluster-webhook-container-v4.10.0-133\nlibguestfs-tools-container-v4.10.0-217\nvirt-handler-container-v4.10.0-217\nvirt-launcher-container-v4.10.0-217\nvirt-artifacts-server-container-v4.10.0-217\nvirt-controller-container-v4.10.0-217\nnode-maintenance-operator-container-v4.10.0-48\nhyperconverged-cluster-operator-container-v4.10.0-133\nvirt-operator-container-v4.10.0-217\ncnv-containernetworking-plugins-container-v4.10.0-49\nkubemacpool-container-v4.10.0-49\nbridge-marker-container-v4.10.0-49\novs-cni-marker-container-v4.10.0-49\novs-cni-plugin-container-v4.10.0-49\nkubernetes-nmstate-handler-container-v4.10.0-49\ncluster-network-addons-operator-container-v4.10.0-49\nhco-bundle-registry-container-v4.10.0-696\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0947",
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1760028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760028"
},
{
"category": "external",
"summary": "1855182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1855182"
},
{
"category": "external",
"summary": "1906151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906151"
},
{
"category": "external",
"summary": "1918294",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918294"
},
{
"category": "external",
"summary": "1935217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935217"
},
{
"category": "external",
"summary": "1945586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945586"
},
{
"category": "external",
"summary": "1958085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958085"
},
{
"category": "external",
"summary": "1959039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959039"
},
{
"category": "external",
"summary": "1975978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975978"
},
{
"category": "external",
"summary": "1983079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983079"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1986970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986970"
},
{
"category": "external",
"summary": "1987009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987009"
},
{
"category": "external",
"summary": "1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "1990061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990061"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1992231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992231"
},
{
"category": "external",
"summary": "1993454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993454"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "1997540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997540"
},
{
"category": "external",
"summary": "1998300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998300"
},
{
"category": "external",
"summary": "1999110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999110"
},
{
"category": "external",
"summary": "1999636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999636"
},
{
"category": "external",
"summary": "2000480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000480"
},
{
"category": "external",
"summary": "2001984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001984"
},
{
"category": "external",
"summary": "2001987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001987"
},
{
"category": "external",
"summary": "2002272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002272"
},
{
"category": "external",
"summary": "2003704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003704"
},
{
"category": "external",
"summary": "2007397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007397"
},
{
"category": "external",
"summary": "2008140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008140"
},
{
"category": "external",
"summary": "2008411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008411"
},
{
"category": "external",
"summary": "2008938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008938"
},
{
"category": "external",
"summary": "2008949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008949"
},
{
"category": "external",
"summary": "2008975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008975"
},
{
"category": "external",
"summary": "2010540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010540"
},
{
"category": "external",
"summary": "2010908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010908"
},
{
"category": "external",
"summary": "2012920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012920"
},
{
"category": "external",
"summary": "2013160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013160"
},
{
"category": "external",
"summary": "2013455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013455"
},
{
"category": "external",
"summary": "2015327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015327"
},
{
"category": "external",
"summary": "2017255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017255"
},
{
"category": "external",
"summary": "2018457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018457"
},
{
"category": "external",
"summary": "2018925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018925"
},
{
"category": "external",
"summary": "2018970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018970"
},
{
"category": "external",
"summary": "2019053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019053"
},
{
"category": "external",
"summary": "2021992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021992"
},
{
"category": "external",
"summary": "2025295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025295"
},
{
"category": "external",
"summary": "2025750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025750"
},
{
"category": "external",
"summary": "2025878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025878"
},
{
"category": "external",
"summary": "2026336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026336"
},
{
"category": "external",
"summary": "2026363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026363"
},
{
"category": "external",
"summary": "2026665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026665"
},
{
"category": "external",
"summary": "2026667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026667"
},
{
"category": "external",
"summary": "2027420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027420"
},
{
"category": "external",
"summary": "2027922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027922"
},
{
"category": "external",
"summary": "2029343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029343"
},
{
"category": "external",
"summary": "2029767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029767"
},
{
"category": "external",
"summary": "2030660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030660"
},
{
"category": "external",
"summary": "2030686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030686"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "2031033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031033"
},
{
"category": "external",
"summary": "2031688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031688"
},
{
"category": "external",
"summary": "2031727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031727"
},
{
"category": "external",
"summary": "2031919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031919"
},
{
"category": "external",
"summary": "2032045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032045"
},
{
"category": "external",
"summary": "2032845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032845"
},
{
"category": "external",
"summary": "2032873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032873"
},
{
"category": "external",
"summary": "2032876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032876"
},
{
"category": "external",
"summary": "2033240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033240"
},
{
"category": "external",
"summary": "2033252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033252"
},
{
"category": "external",
"summary": "2034544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034544"
},
{
"category": "external",
"summary": "2035008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035008"
},
{
"category": "external",
"summary": "2035324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035324"
},
{
"category": "external",
"summary": "2035658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035658"
},
{
"category": "external",
"summary": "2035677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035677"
},
{
"category": "external",
"summary": "2036220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036220"
},
{
"category": "external",
"summary": "2036483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036483"
},
{
"category": "external",
"summary": "2036605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036605"
},
{
"category": "external",
"summary": "2037270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037270"
},
{
"category": "external",
"summary": "2037290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037290"
},
{
"category": "external",
"summary": "2037312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037312"
},
{
"category": "external",
"summary": "2037421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037421"
},
{
"category": "external",
"summary": "2038679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038679"
},
{
"category": "external",
"summary": "2038825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038825"
},
{
"category": "external",
"summary": "2038831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038831"
},
{
"category": "external",
"summary": "2038985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038985"
},
{
"category": "external",
"summary": "2039196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039196"
},
{
"category": "external",
"summary": "2039208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039208"
},
{
"category": "external",
"summary": "2039489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039489"
},
{
"category": "external",
"summary": "2039683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039683"
},
{
"category": "external",
"summary": "2039686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039686"
},
{
"category": "external",
"summary": "2039691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039691"
},
{
"category": "external",
"summary": "2040113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040113"
},
{
"category": "external",
"summary": "2040115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040115"
},
{
"category": "external",
"summary": "2041519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041519"
},
{
"category": "external",
"summary": "2041530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041530"
},
{
"category": "external",
"summary": "2042139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042139"
},
{
"category": "external",
"summary": "2042799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042799"
},
{
"category": "external",
"summary": "2042842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042842"
},
{
"category": "external",
"summary": "2042856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042856"
},
{
"category": "external",
"summary": "2042880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042880"
},
{
"category": "external",
"summary": "2042908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042908"
},
{
"category": "external",
"summary": "2044348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044348"
},
{
"category": "external",
"summary": "2044398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044398"
},
{
"category": "external",
"summary": "2046271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046271"
},
{
"category": "external",
"summary": "2048227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048227"
},
{
"category": "external",
"summary": "2048275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048275"
},
{
"category": "external",
"summary": "2051105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051105"
},
{
"category": "external",
"summary": "2051693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051693"
},
{
"category": "external",
"summary": "2051968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051968"
},
{
"category": "external",
"summary": "2052489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052489"
},
{
"category": "external",
"summary": "2053027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053027"
},
{
"category": "external",
"summary": "2058167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058167"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0947.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update",
"tracking": {
"current_release_date": "2025-11-27T23:53:41+00:00",
"generator": {
"date": "2025-11-27T23:53:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:0947",
"initial_release_date": "2022-03-16T15:45:58+00:00",
"revision_history": [
{
"date": "2022-03-16T15:45:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-16T15:45:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.10 for RHEL 8",
"product": {
"name": "CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.10::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"product": {
"name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"product_id": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.10.0-110"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"product_id": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.10.0-696"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.10.0-62"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.10.0-133"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.10.0-133"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"product": {
"name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"product_id": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"product": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.10.0-50"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"product_id": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"product": {
"name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"product_id": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"product": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"product_id": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.10.0-48"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"product_id": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"product_id": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"product": {
"name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"product_id": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"product_id": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"product_id": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"product_id": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"product_id": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"product_id": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"product": {
"name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"product_id": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"product": {
"name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"product_id": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"product": {
"name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"product_id": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.10.0-10"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"product": {
"name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"product_id": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"product": {
"name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"product_id": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.10.0-217"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64"
},
"product_reference": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64"
},
"product_reference": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64"
},
"product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64"
},
"product_reference": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64"
},
"product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64"
},
"product_reference": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64"
},
"product_reference": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64"
},
"product_reference": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64"
},
"product_reference": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64"
},
"product_reference": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
},
"product_reference": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-33195",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989564"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: lookup functions may return invalid host names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "RHBZ#1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: lookup functions may return invalid host names"
},
{
"cve": "CVE-2021-33197",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "RHBZ#1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty"
},
{
"cve": "CVE-2021-33198",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989575"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33198"
},
{
"category": "external",
"summary": "RHBZ#1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
},
{
"cve": "CVE-2021-44717",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030806"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: syscall: don\u0027t close fd 0 on ForkExec error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44717"
},
{
"category": "external",
"summary": "RHBZ#2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "This bug can be mitigated by raising the per-process file descriptor limit.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: syscall: don\u0027t close fd 0 on ForkExec error"
}
]
}
RHSA-2022_0237
Vulnerability from csaf_redhat - Published: 2022-01-24 13:53 - Updated: 2024-12-17 21:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for etcd is now available for Red Hat OpenStack Platform 16.2\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0237",
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0237.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update",
"tracking": {
"current_release_date": "2024-12-17T21:53:24+00:00",
"generator": {
"date": "2024-12-17T21:53:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0237",
"initial_release_date": "2022-01-24T13:53:27+00:00",
"revision_history": [
{
"date": "2022-01-24T13:53:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-24T13:53:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:53:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.src",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.src",
"product_id": "etcd-0:3.3.23-7.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-24T13:53:27+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-24T13:53:27+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-24T13:53:27+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
}
]
}
RHSA-2022_0434
Vulnerability from csaf_redhat - Published: 2022-02-03 20:05 - Updated: 2024-12-17 21:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Release of OpenShift Serverless 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0434",
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "2024838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024838"
},
{
"category": "external",
"summary": "2024839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024839"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0434.json"
}
],
"title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0",
"tracking": {
"current_release_date": "2024-12-17T21:54:23+00:00",
"generator": {
"date": "2024-12-17T21:54:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0434",
"initial_release_date": "2022-02-03T20:05:14+00:00",
"revision_history": [
{
"date": "2022-02-03T20:05:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-03T20:05:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:54:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Serverless 1.20",
"product": {
"name": "Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1.20::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"product": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"product_id": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"product_identification_helper": {
"purl": "pkg:oci/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"product": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"product": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"product": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"product": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"product": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"product": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"product": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"product_identification_helper": {
"purl": "pkg:oci/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"product": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"product": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"product": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"product": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"product": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"product": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"product": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"product": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"product": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"product": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"product": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"product": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"product_id": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"product": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"product": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"product": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"product": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"product": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"product": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"product": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"product": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"product": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"product": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"product": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"product": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"product": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"product": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"product": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"product": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"product": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"product": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"product": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"product": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"product": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"product": {
"name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.20.0-3"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"product": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"product": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"product": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"product": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"product": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"product": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le"
},
"product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x"
},
"product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64"
},
"product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64"
},
"product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x"
},
"product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64"
},
"product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x"
},
"product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x"
},
"product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64"
},
"product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64"
},
"product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x"
},
"product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x"
},
"product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64"
},
"product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le"
},
"product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64"
},
"product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x"
},
"product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le"
},
"product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64"
},
"product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x"
},
"product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x"
},
"product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64"
},
"product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le"
},
"product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le"
},
"product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64"
},
"product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x"
},
"product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x"
},
"product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64"
},
"product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le"
},
"product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x"
},
"product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le"
},
"product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64"
},
"product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64"
},
"product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x"
},
"product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le"
},
"product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64"
},
"product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x"
},
"product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64"
},
"product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x"
},
"product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64"
},
"product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64"
},
"product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x"
},
"product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64"
},
"product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x"
},
"product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64"
},
"product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x"
},
"product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le"
},
"product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x"
},
"product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
},
"product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T20:05:14+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-38297",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2012887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: Command-line arguments may overwrite global data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38297"
},
{
"category": "external",
"summary": "RHBZ#2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A",
"url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A"
}
],
"release_date": "2021-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T20:05:14+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: Command-line arguments may overwrite global data"
},
{
"cve": "CVE-2021-39293",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2006044"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39293"
},
{
"category": "external",
"summary": "RHBZ#2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"release_date": "2021-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T20:05:14+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)"
}
]
}
RHSA-2022_0577
Vulnerability from csaf_redhat - Published: 2022-03-28 09:34 - Updated: 2024-12-17 21:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0577",
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "1990573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990573"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1992841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992841"
},
{
"category": "external",
"summary": "1994859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994859"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "2000772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000772"
},
{
"category": "external",
"summary": "2001547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001547"
},
{
"category": "external",
"summary": "2002961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002961"
},
{
"category": "external",
"summary": "2005360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005360"
},
{
"category": "external",
"summary": "2008601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008601"
},
{
"category": "external",
"summary": "2015772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015772"
},
{
"category": "external",
"summary": "2032048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032048"
},
{
"category": "external",
"summary": "WINC-747",
"url": "https://issues.redhat.com/browse/WINC-747"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0577.json"
}
],
"title": "Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]",
"tracking": {
"current_release_date": "2024-12-17T21:55:01+00:00",
"generator": {
"date": "2024-12-17T21:55:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0577",
"initial_release_date": "2022-03-28T09:34:15+00:00",
"revision_history": [
{
"date": "2022-03-28T09:34:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-28T09:34:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:55:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.10",
"product": {
"name": "Red Hat OpenShift Container Platform 4.10",
"product_id": "8Base-RHOSE-4.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"product": {
"name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"product_id": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"product_identification_helper": {
"purl": "pkg:oci/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle\u0026tag=v5.0.0-5"
}
}
},
{
"category": "product_version",
"name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"product": {
"name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"product_id": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator\u0026tag=5.0.0-5"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64 as a component of Red Hat OpenShift Container Platform 4.10",
"product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64"
},
"product_reference": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64 as a component of Red Hat OpenShift Container Platform 4.10",
"product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
},
"product_reference": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28851",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28851"
},
{
"category": "external",
"summary": "RHBZ#1913333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension"
},
{
"cve": "CVE-2020-28852",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28852"
},
{
"category": "external",
"summary": "RHBZ#1913338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852"
}
],
"release_date": "2021-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag"
},
{
"cve": "CVE-2021-3121",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921650"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3121"
},
{
"category": "external",
"summary": "RHBZ#1921650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
}
],
"release_date": "2021-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation"
},
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-31525",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1958341"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31525"
},
{
"category": "external",
"summary": "RHBZ#1958341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc",
"url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc"
}
],
"release_date": "2021-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header"
},
{
"cve": "CVE-2021-33195",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989564"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: lookup functions may return invalid host names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "RHBZ#1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: lookup functions may return invalid host names"
},
{
"cve": "CVE-2021-33197",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "RHBZ#1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty"
},
{
"cve": "CVE-2021-33198",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989575"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33198"
},
{
"category": "external",
"summary": "RHBZ#1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-28T09:34:15+00:00",
"details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64",
"8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
}
]
}
RHSA-2022_0947
Vulnerability from csaf_redhat - Published: 2022-03-16 15:45 - Updated: 2024-12-17 21:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.10.0 images:\n\nRHEL-8-CNV-4.10\n\n==============\n\nkubevirt-velero-plugin-container-v4.10.0-8\nvirtio-win-container-v4.10.0-10\nkubevirt-template-validator-container-v4.10.0-16\nhostpath-csi-driver-container-v4.10.0-32\nhostpath-provisioner-container-v4.10.0-32\nhostpath-provisioner-operator-container-v4.10.0-62\ncnv-must-gather-container-v4.10.0-110\nvirt-cdi-controller-container-v4.10.0-90\nvirt-cdi-apiserver-container-v4.10.0-90\nvirt-cdi-uploadserver-container-v4.10.0-90\nvirt-cdi-uploadproxy-container-v4.10.0-90\nvirt-cdi-operator-container-v4.10.0-90\nvirt-cdi-cloner-container-v4.10.0-90\nvirt-cdi-importer-container-v4.10.0-90\nkubevirt-ssp-operator-container-v4.10.0-50\nvirt-api-container-v4.10.0-217\nhyperconverged-cluster-webhook-container-v4.10.0-133\nlibguestfs-tools-container-v4.10.0-217\nvirt-handler-container-v4.10.0-217\nvirt-launcher-container-v4.10.0-217\nvirt-artifacts-server-container-v4.10.0-217\nvirt-controller-container-v4.10.0-217\nnode-maintenance-operator-container-v4.10.0-48\nhyperconverged-cluster-operator-container-v4.10.0-133\nvirt-operator-container-v4.10.0-217\ncnv-containernetworking-plugins-container-v4.10.0-49\nkubemacpool-container-v4.10.0-49\nbridge-marker-container-v4.10.0-49\novs-cni-marker-container-v4.10.0-49\novs-cni-plugin-container-v4.10.0-49\nkubernetes-nmstate-handler-container-v4.10.0-49\ncluster-network-addons-operator-container-v4.10.0-49\nhco-bundle-registry-container-v4.10.0-696\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0947",
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1760028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760028"
},
{
"category": "external",
"summary": "1855182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1855182"
},
{
"category": "external",
"summary": "1906151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906151"
},
{
"category": "external",
"summary": "1918294",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918294"
},
{
"category": "external",
"summary": "1935217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935217"
},
{
"category": "external",
"summary": "1945586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945586"
},
{
"category": "external",
"summary": "1958085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958085"
},
{
"category": "external",
"summary": "1959039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959039"
},
{
"category": "external",
"summary": "1975978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975978"
},
{
"category": "external",
"summary": "1983079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983079"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1986970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986970"
},
{
"category": "external",
"summary": "1987009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987009"
},
{
"category": "external",
"summary": "1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "1990061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990061"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1992231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992231"
},
{
"category": "external",
"summary": "1993454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993454"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "1997540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997540"
},
{
"category": "external",
"summary": "1998300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998300"
},
{
"category": "external",
"summary": "1999110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999110"
},
{
"category": "external",
"summary": "1999636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999636"
},
{
"category": "external",
"summary": "2000480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000480"
},
{
"category": "external",
"summary": "2001984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001984"
},
{
"category": "external",
"summary": "2001987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001987"
},
{
"category": "external",
"summary": "2002272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002272"
},
{
"category": "external",
"summary": "2003704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003704"
},
{
"category": "external",
"summary": "2007397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007397"
},
{
"category": "external",
"summary": "2008140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008140"
},
{
"category": "external",
"summary": "2008411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008411"
},
{
"category": "external",
"summary": "2008938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008938"
},
{
"category": "external",
"summary": "2008949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008949"
},
{
"category": "external",
"summary": "2008975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008975"
},
{
"category": "external",
"summary": "2010540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010540"
},
{
"category": "external",
"summary": "2010908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010908"
},
{
"category": "external",
"summary": "2012920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012920"
},
{
"category": "external",
"summary": "2013160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013160"
},
{
"category": "external",
"summary": "2013455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013455"
},
{
"category": "external",
"summary": "2015327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015327"
},
{
"category": "external",
"summary": "2017255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017255"
},
{
"category": "external",
"summary": "2018457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018457"
},
{
"category": "external",
"summary": "2018925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018925"
},
{
"category": "external",
"summary": "2018970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018970"
},
{
"category": "external",
"summary": "2019053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019053"
},
{
"category": "external",
"summary": "2021992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021992"
},
{
"category": "external",
"summary": "2025295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025295"
},
{
"category": "external",
"summary": "2025750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025750"
},
{
"category": "external",
"summary": "2025878",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025878"
},
{
"category": "external",
"summary": "2026336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026336"
},
{
"category": "external",
"summary": "2026363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026363"
},
{
"category": "external",
"summary": "2026665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026665"
},
{
"category": "external",
"summary": "2026667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026667"
},
{
"category": "external",
"summary": "2027420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027420"
},
{
"category": "external",
"summary": "2027922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027922"
},
{
"category": "external",
"summary": "2029343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029343"
},
{
"category": "external",
"summary": "2029767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029767"
},
{
"category": "external",
"summary": "2030660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030660"
},
{
"category": "external",
"summary": "2030686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030686"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "2031033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031033"
},
{
"category": "external",
"summary": "2031688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031688"
},
{
"category": "external",
"summary": "2031727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031727"
},
{
"category": "external",
"summary": "2031919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031919"
},
{
"category": "external",
"summary": "2032045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032045"
},
{
"category": "external",
"summary": "2032845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032845"
},
{
"category": "external",
"summary": "2032873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032873"
},
{
"category": "external",
"summary": "2032876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032876"
},
{
"category": "external",
"summary": "2033240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033240"
},
{
"category": "external",
"summary": "2033252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033252"
},
{
"category": "external",
"summary": "2034544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034544"
},
{
"category": "external",
"summary": "2035008",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035008"
},
{
"category": "external",
"summary": "2035324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035324"
},
{
"category": "external",
"summary": "2035658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035658"
},
{
"category": "external",
"summary": "2035677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035677"
},
{
"category": "external",
"summary": "2036220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036220"
},
{
"category": "external",
"summary": "2036483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036483"
},
{
"category": "external",
"summary": "2036605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036605"
},
{
"category": "external",
"summary": "2037270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037270"
},
{
"category": "external",
"summary": "2037290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037290"
},
{
"category": "external",
"summary": "2037312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037312"
},
{
"category": "external",
"summary": "2037421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037421"
},
{
"category": "external",
"summary": "2038679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038679"
},
{
"category": "external",
"summary": "2038825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038825"
},
{
"category": "external",
"summary": "2038831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038831"
},
{
"category": "external",
"summary": "2038985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038985"
},
{
"category": "external",
"summary": "2039196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039196"
},
{
"category": "external",
"summary": "2039208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039208"
},
{
"category": "external",
"summary": "2039489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039489"
},
{
"category": "external",
"summary": "2039683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039683"
},
{
"category": "external",
"summary": "2039686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039686"
},
{
"category": "external",
"summary": "2039691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039691"
},
{
"category": "external",
"summary": "2040113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040113"
},
{
"category": "external",
"summary": "2040115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040115"
},
{
"category": "external",
"summary": "2041519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041519"
},
{
"category": "external",
"summary": "2041530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041530"
},
{
"category": "external",
"summary": "2042139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042139"
},
{
"category": "external",
"summary": "2042799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042799"
},
{
"category": "external",
"summary": "2042842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042842"
},
{
"category": "external",
"summary": "2042856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042856"
},
{
"category": "external",
"summary": "2042880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042880"
},
{
"category": "external",
"summary": "2042908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042908"
},
{
"category": "external",
"summary": "2044348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044348"
},
{
"category": "external",
"summary": "2044398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044398"
},
{
"category": "external",
"summary": "2046271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046271"
},
{
"category": "external",
"summary": "2048227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048227"
},
{
"category": "external",
"summary": "2048275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048275"
},
{
"category": "external",
"summary": "2051105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051105"
},
{
"category": "external",
"summary": "2051693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051693"
},
{
"category": "external",
"summary": "2051968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051968"
},
{
"category": "external",
"summary": "2052489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052489"
},
{
"category": "external",
"summary": "2053027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053027"
},
{
"category": "external",
"summary": "2058167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058167"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0947.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update",
"tracking": {
"current_release_date": "2024-12-17T21:54:52+00:00",
"generator": {
"date": "2024-12-17T21:54:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0947",
"initial_release_date": "2022-03-16T15:45:58+00:00",
"revision_history": [
{
"date": "2022-03-16T15:45:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-03-16T15:45:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:54:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CNV 4.10 for RHEL 8",
"product": {
"name": "CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_native_virtualization:4.10::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"product": {
"name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"product_id": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"product": {
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"product": {
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"product": {
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.10.0-110"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"product": {
"name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"product_id": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.10.0-696"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product": {
"name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_id": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.10.0-32"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"product": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.10.0-62"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.10.0-133"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"product": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.10.0-133"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"product": {
"name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"product_id": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"product": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.10.0-50"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"product": {
"name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"product_id": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.10.0-16"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"product": {
"name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"product_id": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"product": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"product_id": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.10.0-48"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"product_id": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"product": {
"name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"product_id": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.10.0-49"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"product": {
"name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"product_id": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"product": {
"name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"product_id": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"product_id": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"product_id": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"product_id": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"product_id": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"product": {
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.10.0-90"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"product": {
"name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"product_id": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"product": {
"name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"product_id": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"product": {
"name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"product_id": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.10.0-10"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"product": {
"name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"product_id": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.10.0-217"
}
}
},
{
"category": "product_version",
"name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"product": {
"name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"product_id": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.10.0-217"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64"
},
"product_reference": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64"
},
"product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64"
},
"product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
},
"product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64"
},
"product_reference": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64"
},
"product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64"
},
"product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
},
"product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64"
},
"product_reference": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64"
},
"product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64"
},
"product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64"
},
"product_reference": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64"
},
"product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64"
},
"product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64"
},
"product_reference": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64"
},
"product_reference": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
},
"product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64"
},
"product_reference": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64"
},
"product_reference": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64"
},
"product_reference": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64"
},
"product_reference": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64 as a component of CNV 4.10 for RHEL 8",
"product_id": "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
},
"product_reference": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64",
"relates_to_product_reference": "8Base-CNV-4.10"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-33195",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989564"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: lookup functions may return invalid host names",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "RHBZ#1989564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: lookup functions may return invalid host names"
},
{
"cve": "CVE-2021-33197",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "RHBZ#1989570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty"
},
{
"cve": "CVE-2021-33198",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989575"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33198"
},
{
"category": "external",
"summary": "RHBZ#1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
},
{
"cve": "CVE-2021-44717",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030806"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: syscall: don\u0027t close fd 0 on ForkExec error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"known_not_affected": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44717"
},
{
"category": "external",
"summary": "RHBZ#2030806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-16T15:45:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "workaround",
"details": "This bug can be mitigated by raising the per-process file descriptor limit.",
"product_ids": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64",
"8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64",
"8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64",
"8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64",
"8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64",
"8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64",
"8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64",
"8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64",
"8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64",
"8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64",
"8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: syscall: don\u0027t close fd 0 on ForkExec error"
}
]
}
RHSA-2021:4902
Vulnerability from csaf_redhat - Published: 2021-12-01 17:22 - Updated: 2025-11-21 18:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The release of RHACS 3.67 provides the following new features, bug fixes, security patches and system changes:\n\nOpenShift Dedicated support\n\nRHACS 3.67 is thoroughly tested and supported on OpenShift Dedicated on Amazon Web Services and Google Cloud Platform.\n\n1. Use OpenShift OAuth server as an identity provider\nIf you are using RHACS with OpenShift, you can now configure the built-in OpenShift OAuth server as an identity provider for RHACS. \n\n2. Enhancements for CI outputs\nRed Hat has improved the usability of RHACS CI integrations. CI outputs now show additional detailed information about the vulnerabilities and the security policies responsible for broken builds.\n\n3. Runtime Class policy criteria\nUsers can now use RHACS to define the container runtime configuration that may be used to run a pod\u2019s containers using the Runtime Class policy criteria.\n\nSecurity Fix(es):\n\n* civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API (CVE-2020-27304)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* nodejs-prismjs: ReDoS vulnerability (CVE-2021-3801)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* helm: information disclosure vulnerability (CVE-2021-32690)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes\nThe release of RHACS 3.67 includes the following bug fixes:\n\n1. Previously, when using RHACS with the Compliance Operator integration, RHACS did not respect or populate Compliance Operator TailoredProfiles. This has been fixed.\n\n2. Previously, the Alpine Linux package manager (APK) in Image policy looked for the presence of apk package in the image rather than the apk-tools package. This issue has been fixed.\n\nSystem changes\nThe release of RHACS 3.67 includes the following system changes:\n\n1. Scanner now identifies vulnerabilities in Ubuntu 21.10 images.\n2. The Port exposure method policy criteria now include route as an exposure method.\n3. The OpenShift: Kubeadmin Secret Accessed security policy now allows the OpenShift Compliance Operator to check for the existence of the Kubeadmin secret without creating a violation.\n4. The OpenShift Compliance Operator integration now supports using TailoredProfiles.\n5. The RHACS Jenkins plugin now provides additional security information.\n6. When you enable the environment variable ROX_NETWORK_ACCESS_LOG for Central, the logs contain the Request URI and X-Forwarded-For header values.\n7. The default uid:gid pair for the Scanner image is now 65534:65534.\n8. RHACS adds a new default Scope Manager role that includes minimum permissions to create and modify access scopes.\n9. If microdnf is part of an image or shows up in process execution, RHACS reports it as a security violation for the Red Hat Package Manager in Image or the Red Hat Package Manager Execution security policies.\n10. In addition to manually uploading vulnerability definitions in offline mode, you can now upload definitions in online mode. \n11. You can now format the output of the following roxctl CLI commands in table, csv, or JSON format: image scan, image check \u0026 deployment check\n12. You can now use a regular expression for the deployment name while specifying policy exclusions",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4902",
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1956818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818"
},
{
"category": "external",
"summary": "1978144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "2005445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445"
},
{
"category": "external",
"summary": "2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "2016640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640"
},
{
"category": "external",
"summary": "ROX-9371",
"url": "https://issues.redhat.com/browse/ROX-9371"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4902.json"
}
],
"title": "Red Hat Security Advisory: ACS 3.67 security and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:27:09+00:00",
"generator": {
"date": "2025-11-21T18:27:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:4902",
"initial_release_date": "2021-12-01T17:22:46+00:00",
"revision_history": [
{
"date": "2021-12-01T17:22:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-12-01T17:22:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:27:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHACS 3.67 for RHEL 8",
"product": {
"name": "RHACS 3.67 for RHEL 8",
"product_id": "8Base-RHACS-3.67",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:advanced_cluster_security:3.67::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Security for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.67.0-2"
}
}
},
{
"category": "product_version",
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"product": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.67.0-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64 as a component of RHACS 3.67 for RHEL 8",
"product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"relates_to_product_reference": "8Base-RHACS-3.67"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64 as a component of RHACS 3.67 for RHEL 8",
"product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
},
"product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64",
"relates_to_product_reference": "8Base-RHACS-3.67"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-27304",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2021-10-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016640"
}
],
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability was found in CivetWeb (embeddable web server/library). Due to a directory traversal issue, an attacker is able to add or overwrite files that are subsequently executed which lead to impact to confidentiality, integrity, and availability of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only impacts CivetWeb-based web applications that use the built-in file upload form handler (full working example in the \u201cembedded_c\u201d example in the CivetWeb sources).\n\nRed Hat Advanced Cluster Security includes code from CivetWeb in the Collector component, however it does not use the file upload form handler, hence is not impacted by this vulnerability. This vulnerability is rated Low for Red Hat Advanced Cluster Security.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27304"
},
{
"category": "external",
"summary": "RHBZ#2016640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304"
},
{
"category": "external",
"summary": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ",
"url": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ"
},
{
"category": "external",
"summary": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/",
"url": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/"
}
],
"release_date": "2021-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API"
},
{
"cve": "CVE-2021-3749",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999784"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-axios: Regular expression denial of service in trim function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3749"
},
{
"category": "external",
"summary": "RHBZ#1999784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929",
"url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31",
"url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31"
}
],
"release_date": "2021-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-axios: Regular expression denial of service in trim function"
},
{
"cve": "CVE-2021-3801",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2005445"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient Regular Expression Complexity in prismjs leads to a Regular Expression Denial of Service (ReDoS) attack. An unauthenticated attacker can exploit this flaw to cause an application to consume an excess amount of CPU by providing a crafted HTML comment as input. This can result in a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-prismjs: ReDoS vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of prismjs. However due to the instance being read only and behind OpenShift OAuth, it has been given a Low impact. Additionally it has been marked as wont-fix at this time and may be fixed in a future release.\n\nJust as OCP, OpenShift ServiceMesh (OSSM) components are behind OpenShift OAuth what reducing impact to Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3801"
},
{
"category": "external",
"summary": "RHBZ#2005445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801"
}
],
"release_date": "2021-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-prismjs: ReDoS vulnerability"
},
{
"cve": "CVE-2021-23343",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1956818"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23343"
},
{
"category": "external",
"summary": "RHBZ#1956818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067",
"url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067"
}
],
"release_date": "2021-05-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe"
},
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-32690",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1978144"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "helm: information disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32690"
},
{
"category": "external",
"summary": "RHBZ#1978144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690"
},
{
"category": "external",
"summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf",
"url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf"
}
],
"release_date": "2021-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "helm: information disclosure vulnerability"
},
{
"cve": "CVE-2021-39293",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2006044"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"known_not_affected": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39293"
},
{
"category": "external",
"summary": "RHBZ#2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"release_date": "2021-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-01T17:22:46+00:00",
"details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.",
"product_ids": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64",
"8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)"
}
]
}
RHSA-2022:0237
Vulnerability from csaf_redhat - Published: 2022-01-24 13:53 - Updated: 2025-11-27 23:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for etcd is now available for Red Hat OpenStack Platform 16.2\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0237",
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0237.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update",
"tracking": {
"current_release_date": "2025-11-27T23:53:40+00:00",
"generator": {
"date": "2025-11-27T23:53:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2022:0237",
"initial_release_date": "2022-01-24T13:53:27+00:00",
"revision_history": [
{
"date": "2022-01-24T13:53:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-24T13:53:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-27T23:53:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.src",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.src",
"product_id": "etcd-0:3.3.23-7.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.src as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
},
"product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-24T13:53:27+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-24T13:53:27+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"cve": "CVE-2021-44716",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030801"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: limit growth of header canonicalization cache",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44716"
},
{
"category": "external",
"summary": "RHBZ#2030801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
}
],
"release_date": "2021-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-24T13:53:27+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.",
"product_ids": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src",
"8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le",
"8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http: limit growth of header canonicalization cache"
}
]
}
RHSA-2022_0318
Vulnerability from csaf_redhat - Published: 2022-01-27 16:52 - Updated: 2024-12-17 21:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Openshift distributed tracing 2.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift distributed Tracing provides these changes:\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThe Red Hat OpenShift distributed tracing release notes provide information on\nthe features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0318",
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "TRACING-2235",
"url": "https://issues.redhat.com/browse/TRACING-2235"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0318.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update",
"tracking": {
"current_release_date": "2024-12-17T21:53:49+00:00",
"generator": {
"date": "2024-12-17T21:53:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0318",
"initial_release_date": "2022-01-27T16:52:20+00:00",
"revision_history": [
{
"date": "2022-01-27T16:52:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-28T15:04:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:53:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 2.1",
"product": {
"name": "Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:2.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64 as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1",
"product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-2.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-27T16:52:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-27T16:52:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64",
"8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x",
"8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
}
]
}
RHSA-2022_0561
Vulnerability from csaf_redhat - Published: 2022-02-23 12:57 - Updated: 2024-12-17 21:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.9.22. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2022:0557\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n$ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-x86_64\n\nThe image digest is\nsha256:912e4b9986f690b894fcb740881e780600e12ab22f128f6f873bc4e1fcda8d13\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-s390x\n\nThe image digest is\nsha256:fa19f34390bc50968af736bdedb193b36d5d832b1090bf215e1fe279f05d6c94\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le\n\nThe image digest is\nsha256:857cab82eba0ad370669258da450b89d8c6e5cea25c61ee930f9e30bfcd515dd\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0561",
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "2015706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015706"
},
{
"category": "external",
"summary": "2022158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022158"
},
{
"category": "external",
"summary": "2023339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023339"
},
{
"category": "external",
"summary": "2026553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026553"
},
{
"category": "external",
"summary": "2028250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028250"
},
{
"category": "external",
"summary": "2028812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028812"
},
{
"category": "external",
"summary": "2029867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029867"
},
{
"category": "external",
"summary": "2032985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032985"
},
{
"category": "external",
"summary": "2033274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033274"
},
{
"category": "external",
"summary": "2033672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033672"
},
{
"category": "external",
"summary": "2038252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038252"
},
{
"category": "external",
"summary": "2042444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042444"
},
{
"category": "external",
"summary": "2042494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042494"
},
{
"category": "external",
"summary": "2042677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042677"
},
{
"category": "external",
"summary": "2043650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043650"
},
{
"category": "external",
"summary": "2043807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043807"
},
{
"category": "external",
"summary": "2046476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046476"
},
{
"category": "external",
"summary": "2047350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047350"
},
{
"category": "external",
"summary": "2048173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048173"
},
{
"category": "external",
"summary": "2049774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049774"
},
{
"category": "external",
"summary": "2050311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050311"
},
{
"category": "external",
"summary": "2051523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051523"
},
{
"category": "external",
"summary": "2052063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052063"
},
{
"category": "external",
"summary": "2052549",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052549"
},
{
"category": "external",
"summary": "2052850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052850"
},
{
"category": "external",
"summary": "2053222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053222"
},
{
"category": "external",
"summary": "2053496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053496"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0561.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update",
"tracking": {
"current_release_date": "2024-12-17T21:54:02+00:00",
"generator": {
"date": "2024-12-17T21:54:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:0561",
"initial_release_date": "2022-02-23T12:57:44+00:00",
"revision_history": [
{
"date": "2022-02-23T12:57:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-23T12:57:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:54:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.9",
"product": {
"name": "Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"product_id": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"product": {
"name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"product_id": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_id": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gfd2d838.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"product": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.9.0-202202120107.p0.g0e0c173.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"product_id": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"product": {
"name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"product_id": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"product": {
"name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"product_id": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"product": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.9.0-202202120107.p0.g90b5722.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"product_id": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g1e8c94f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"product_id": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"product": {
"name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"product_id": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"product_id": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"product_id": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"product": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"product_id": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"product": {
"name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"product_id": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"product": {
"name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"product_id": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"product": {
"name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"product_id": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"product": {
"name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"product_id": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"product_id": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"product_id": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"product": {
"name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"product_id": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"product_id": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"product": {
"name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"product_id": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"product": {
"name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"product_id": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"product_id": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"product": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g18d82a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g26f1b6f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g8226e86.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"product": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g37a1328.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"product": {
"name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"product_id": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gc02678d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"product": {
"name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"product_id": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-node-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gc02678d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"product": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"product_id": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gade7373.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"product": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"product_id": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g15e474c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"product": {
"name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"product_id": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"product_id": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"product": {
"name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"product_id": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_id": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"product": {
"name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"product_id": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"product": {
"name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"product_id": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"product": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"product_id": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.gd92b088.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g48d49f7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.gd8a891d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"product_id": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"product": {
"name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"product_id": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"product_id": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"product_id": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"product": {
"name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"product_id": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"product": {
"name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"product_id": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"product_id": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"product_id": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"product_id": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"product_id": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"product_id": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_id": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product": {
"name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_id": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_id": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g9f56afd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product": {
"name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_id": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g9f56afd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"product": {
"name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"product_id": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-problem-detector-rhel8\u0026tag=v4.9.0-202202120107.p0.gde8606f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"product_id": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"product": {
"name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"product_id": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"product": {
"name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"product_id": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-syncer-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"product_id": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"product_id": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"product_id": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"product": {
"name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"product_id": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_id": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"product_id": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"product": {
"name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"product_id": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"product": {
"name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"product_id": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"product_id": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"product_id": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"product_id": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"product": {
"name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"product_id": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"product": {
"name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"product_id": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"product": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"product_id": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"product": {
"name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"product_id": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"product": {
"name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"product_id": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"product": {
"name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"product_id": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"product": {
"name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"product_id": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"product_id": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"product": {
"name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"product_id": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"product": {
"name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"product_id": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"product": {
"name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"product_id": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"product": {
"name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"product_id": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"product": {
"name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"product_id": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"product": {
"name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"product_id": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"product_id": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"product_id": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_id": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"product": {
"name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"product_id": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"product_id": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"product": {
"name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"product_id": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"product_id": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"product_id": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"product_id": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"product": {
"name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"product_id": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"product_id": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"product_id": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"product_id": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"product_id": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"product_id": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"product_id": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"product_id": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"product": {
"name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"product_id": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"product_id": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"product_id": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"product_id": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"product": {
"name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"product_id": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_id": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gfd2d838.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"product": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.9.0-202202120107.p0.g0e0c173.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"product_id": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"product": {
"name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"product_id": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"product": {
"name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"product_id": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"product": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.9.0-202202120107.p0.g90b5722.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"product_id": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"product_id": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"product": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g1e8c94f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"product_id": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"product": {
"name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"product_id": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"product": {
"name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"product_id": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"product": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"product_id": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"product": {
"name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"product_id": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"product": {
"name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"product_id": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"product": {
"name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"product_id": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"product": {
"name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"product_id": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"product_id": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"product": {
"name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"product_id": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"product": {
"name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"product_id": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"product": {
"name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"product_id": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"product": {
"name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"product_id": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"product": {
"name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"product_id": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"product": {
"name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"product_id": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"product_id": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"product_id": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_id": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"product": {
"name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"product_id": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"product": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"product_id": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.gd92b088.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g48d49f7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"product": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.gd8a891d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"product_id": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"product": {
"name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"product_id": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"product_id": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"product_id": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"product_id": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"product": {
"name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"product_id": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"product_id": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"product_id": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"product_id": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"product_id": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"product_id": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"product_id": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"product_id": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"product": {
"name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"product_id": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"product": {
"name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"product_id": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"product": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"product_id": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"product": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"product": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"product_id": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"product": {
"name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"product_id": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"product": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"product": {
"name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"product_id": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"product": {
"name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"product_id": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"product": {
"name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"product_id": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product": {
"name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_id": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product": {
"name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_id": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_id": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product": {
"name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_id": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"product": {
"name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"product_id": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"product": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"product_id": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"product": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"product_id": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"product": {
"name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"product_id": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"product": {
"name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"product_id": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"product": {
"name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"product_id": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"product": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"product_id": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"product": {
"name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"product_id": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"product": {
"name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"product_id": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"product": {
"name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"product_id": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"product": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"product_id": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"product": {
"name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"product_id": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"product": {
"name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"product_id": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"product": {
"name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"product_id": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"product": {
"name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"product_id": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"product": {
"name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"product_id": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"product": {
"name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"product_id": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"product": {
"name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"product_id": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"product": {
"name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"product_id": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"product": {
"name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"product_id": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"product": {
"name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"product_id": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"product": {
"name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"product_id": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"product": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"product": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"product_id": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"product": {
"name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"product_id": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"product": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g18d82a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g26f1b6f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"product": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"product": {
"name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"product_id": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g8226e86.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"product": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g37a1328.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"product": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"product": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"product": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"product": {
"name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"product_id": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"product": {
"name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"product_id": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"product": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"product_id": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"product": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"product": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"product": {
"name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"product_id": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"product": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"product": {
"name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"product_id": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"product": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"product": {
"name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"product_id": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"product": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"product_id": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"product": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"product_id": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"product": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"product": {
"name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"product_id": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"product": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"product": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"product": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"product": {
"name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"product_id": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"product": {
"name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"product_id": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"product": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product": {
"name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_id": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_id": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_id": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"product": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"product": {
"name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"product_id": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"product": {
"name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"product_id": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"product": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"product_id": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"product": {
"name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"product_id": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"product": {
"name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"product_id": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"product": {
"name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"product_id": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"product": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"product_id": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"product": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"product": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"product": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"product_id": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"product": {
"name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"product_id": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"product": {
"name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"product_id": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"product": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"product": {
"name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"product_id": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"product": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"product": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"product": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"product": {
"name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"product_id": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"product": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"product": {
"name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"product_id": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"product": {
"name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"product_id": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"product": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"product": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"product": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"product": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"product": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"product": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"product_id": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"product": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"product": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"product": {
"name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"product_id": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"product": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"product": {
"name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"product_id": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"product": {
"name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"product_id": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"product": {
"name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"product_id": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"product": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"product_id": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"product": {
"name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"product_id": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"product": {
"name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"product_id": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream"
}
}
},
{
"category": "product_version",
"name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"product": {
"name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"product_id": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64"
},
"product_reference": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64"
},
"product_reference": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64"
},
"product_reference": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64"
},
"product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64"
},
"product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64"
},
"product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64"
},
"product_reference": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64"
},
"product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64"
},
"product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64"
},
"product_reference": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64"
},
"product_reference": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64"
},
"product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64"
},
"product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64"
},
"product_reference": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x"
},
"product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64"
},
"product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x"
},
"product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64"
},
"product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le"
},
"product_reference": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x"
},
"product_reference": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64"
},
"product_reference": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x"
},
"product_reference": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le"
},
"product_reference": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64"
},
"product_reference": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x"
},
"product_reference": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64"
},
"product_reference": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64"
},
"product_reference": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le"
},
"product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64"
},
"product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64"
},
"product_reference": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64"
},
"product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64"
},
"product_reference": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64"
},
"product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64"
},
"product_reference": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x"
},
"product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64"
},
"product_reference": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x"
},
"product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64"
},
"product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x"
},
"product_reference": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x"
},
"product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le"
},
"product_reference": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le"
},
"product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le"
},
"product_reference": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64"
},
"product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le"
},
"product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x"
},
"product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x"
},
"product_reference": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le"
},
"product_reference": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64"
},
"product_reference": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64"
},
"product_reference": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64"
},
"product_reference": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le"
},
"product_reference": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64"
},
"product_reference": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x"
},
"product_reference": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64"
},
"product_reference": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64"
},
"product_reference": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x"
},
"product_reference": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le"
},
"product_reference": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64"
},
"product_reference": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x"
},
"product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le"
},
"product_reference": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x"
},
"product_reference": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64"
},
"product_reference": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64"
},
"product_reference": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le"
},
"product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64"
},
"product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x"
},
"product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x"
},
"product_reference": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x"
},
"product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x"
},
"product_reference": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x"
},
"product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x"
},
"product_reference": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x"
},
"product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x"
},
"product_reference": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64"
},
"product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64"
},
"product_reference": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64"
},
"product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64"
},
"product_reference": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64"
},
"product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x"
},
"product_reference": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64"
},
"product_reference": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le"
},
"product_reference": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64"
},
"product_reference": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le"
},
"product_reference": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x"
},
"product_reference": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64"
},
"product_reference": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x"
},
"product_reference": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le"
},
"product_reference": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64"
},
"product_reference": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64"
},
"product_reference": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x"
},
"product_reference": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le"
},
"product_reference": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64"
},
"product_reference": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le"
},
"product_reference": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64"
},
"product_reference": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64"
},
"product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64"
},
"product_reference": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le"
},
"product_reference": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x"
},
"product_reference": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64"
},
"product_reference": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x"
},
"product_reference": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le"
},
"product_reference": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x"
},
"product_reference": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64"
},
"product_reference": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x"
},
"product_reference": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x"
},
"product_reference": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le"
},
"product_reference": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64"
},
"product_reference": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64"
},
"product_reference": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x"
},
"product_reference": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le"
},
"product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64"
},
"product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64"
},
"product_reference": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le"
},
"product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x"
},
"product_reference": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64"
},
"product_reference": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64"
},
"product_reference": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le"
},
"product_reference": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x"
},
"product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le"
},
"product_reference": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le"
},
"product_reference": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64"
},
"product_reference": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le"
},
"product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le"
},
"product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64"
},
"product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64"
},
"product_reference": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x"
},
"product_reference": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64"
},
"product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x"
},
"product_reference": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64"
},
"product_reference": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le"
},
"product_reference": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64"
},
"product_reference": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x"
},
"product_reference": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x"
},
"product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64"
},
"product_reference": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64"
},
"product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x"
},
"product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x"
},
"product_reference": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64"
},
"product_reference": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le"
},
"product_reference": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64"
},
"product_reference": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x"
},
"product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64"
},
"product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64"
},
"product_reference": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le"
},
"product_reference": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64"
},
"product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x"
},
"product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x"
},
"product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le"
},
"product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64"
},
"product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64"
},
"product_reference": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64"
},
"product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64"
},
"product_reference": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x"
},
"product_reference": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le"
},
"product_reference": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64"
},
"product_reference": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64"
},
"product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64"
},
"product_reference": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x"
},
"product_reference": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64"
},
"product_reference": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64"
},
"product_reference": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le"
},
"product_reference": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64"
},
"product_reference": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64"
},
"product_reference": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x"
},
"product_reference": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64"
},
"product_reference": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x"
},
"product_reference": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64"
},
"product_reference": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le"
},
"product_reference": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64"
},
"product_reference": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64"
},
"product_reference": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64"
},
"product_reference": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64"
},
"product_reference": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64"
},
"product_reference": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le"
},
"product_reference": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x"
},
"product_reference": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64"
},
"product_reference": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x"
},
"product_reference": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le"
},
"product_reference": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64"
},
"product_reference": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x"
},
"product_reference": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
},
"product_reference": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64"
},
"product_reference": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64"
},
"product_reference": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64"
},
"product_reference": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64"
},
"product_reference": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64"
},
"product_reference": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64"
},
"product_reference": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64 as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"relates_to_product_reference": "8Base-RHOSE-4.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le as a component of Red Hat OpenShift Container Platform 4.9",
"product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
},
"product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"known_not_affected": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:57:44+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-36221",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995656"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"known_not_affected": [
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "RHBZ#1995656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk",
"url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk"
}
],
"release_date": "2021-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-23T12:57:44+00:00",
"details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le",
"8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x",
"8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64",
"8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64",
"8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64",
"8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x",
"8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x",
"8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64",
"8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64",
"8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x",
"8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x",
"8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64",
"8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64",
"8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x",
"8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64",
"8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x",
"8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64",
"8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le",
"8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64",
"8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64",
"8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic"
}
]
}
RHSA-2022:0434
Vulnerability from csaf_redhat - Published: 2022-02-03 20:05 - Updated: 2025-11-21 18:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Release of OpenShift Serverless 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0434",
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index"
},
{
"category": "external",
"summary": "1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "2024838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024838"
},
{
"category": "external",
"summary": "2024839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024839"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0434.json"
}
],
"title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0",
"tracking": {
"current_release_date": "2025-11-21T18:28:29+00:00",
"generator": {
"date": "2025-11-21T18:28:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:0434",
"initial_release_date": "2022-02-03T20:05:14+00:00",
"revision_history": [
{
"date": "2022-02-03T20:05:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-02-03T20:05:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:28:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Serverless 1.20",
"product": {
"name": "Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:serverless:1.20::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Serverless"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"product": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"product_id": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"product_identification_helper": {
"purl": "pkg:oci/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"product": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"product": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"product": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"product": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"product": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"product": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"product": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"product": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"product_identification_helper": {
"purl": "pkg:oci/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"product": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"product": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"product": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"product": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"product": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"product": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"product": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"product": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"product": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"product": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"product": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"product": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"product_id": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"product": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"product": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"product": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"product": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"product": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"product": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"product": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"product": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"product": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"product": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"product": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"product": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"product": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"product": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"product": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"product": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"product": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"product": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"product": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"product": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"product": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"product": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"product": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"product": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"product": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"product": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"product_identification_helper": {
"purl": "pkg:oci/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"product": {
"name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.20.0-3"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"product": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"product": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"product": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"product": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"product": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"product": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"product": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1"
}
}
},
{
"category": "product_version",
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"product": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64"
},
"product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le"
},
"product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x"
},
"product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64"
},
"product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64"
},
"product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x"
},
"product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64"
},
"product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x"
},
"product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64"
},
"product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64"
},
"product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x"
},
"product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x"
},
"product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64"
},
"product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64"
},
"product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x"
},
"product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x"
},
"product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le"
},
"product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64"
},
"product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le"
},
"product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64"
},
"product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x"
},
"product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le"
},
"product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64"
},
"product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x"
},
"product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x"
},
"product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64"
},
"product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le"
},
"product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le"
},
"product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64"
},
"product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x"
},
"product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x"
},
"product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64"
},
"product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le"
},
"product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x"
},
"product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le"
},
"product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64"
},
"product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64"
},
"product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x"
},
"product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le"
},
"product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64"
},
"product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x"
},
"product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64"
},
"product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64"
},
"product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x"
},
"product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64"
},
"product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64"
},
"product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x"
},
"product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64"
},
"product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x"
},
"product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le"
},
"product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64"
},
"product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x"
},
"product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le"
},
"product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x"
},
"product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64 as a component of Red Hat OpenShift Serverless 1.20",
"product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
},
"product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64",
"relates_to_product_reference": "8Base-Openshift-Serverless-1.20"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1992006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29923"
},
{
"category": "external",
"summary": "RHBZ#1992006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"category": "external",
"summary": "https://sick.codes/sick-2021-016/",
"url": "https://sick.codes/sick-2021-016/"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T20:05:14+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet"
},
{
"cve": "CVE-2021-38297",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2012887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: Command-line arguments may overwrite global data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38297"
},
{
"category": "external",
"summary": "RHBZ#2012887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A",
"url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A"
}
],
"release_date": "2021-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T20:05:14+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: Command-line arguments may overwrite global data"
},
{
"cve": "CVE-2021-39293",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2006044"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39293"
},
{
"category": "external",
"summary": "RHBZ#2006044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"release_date": "2021-08-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-03T20:05:14+00:00",
"details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index",
"product_ids": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x",
"8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)"
}
]
}
WID-SEC-W-2022-0970
Vulnerability from csaf_certbund - Published: 2022-04-07 22:00 - Updated: 2024-05-21 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0970 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0970.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0970 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0970"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:4668 vom 2022-05-19",
"url": "https://access.redhat.com/errata/RHSA-2022:4668"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2022-04-07",
"url": "https://access.redhat.com/errata/RHSA-2022:1275"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2022-04-07",
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1679"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9362 vom 2022-05-09",
"url": "https://linux.oracle.com/errata/ELSA-2022-9362.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202208-02 vom 2022-08-09",
"url": "https://security.gentoo.org/glsa/202208-02"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-7129 vom 2022-10-26",
"url": "https://linux.oracle.com/errata/ELSA-2022-7129.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7129 vom 2022-10-25",
"url": "https://access.redhat.com/errata/RHSA-2022:7129"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7457 vom 2022-11-08",
"url": "https://access.redhat.com/errata/RHSA-2022:7457"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7954 vom 2022-11-15",
"url": "https://access.redhat.com/errata/RHSA-2022:7954"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2303 vom 2023-10-20",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2303.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2944 vom 2024-05-21",
"url": "https://access.redhat.com/errata/RHSA-2024:2944"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-05-21T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:33:04.107+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0970",
"initial_release_date": "2022-04-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-04-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-05-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-08-09T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2022-10-25T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2022-11-08T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-11-15T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-19T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "T022509",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4"
}
}
},
{
"category": "product_version_range",
"name": "Service Mesh \u003c2.1.2",
"product": {
"name": "Red Hat OpenShift Service Mesh \u003c2.1.2",
"product_id": "T022580"
}
},
{
"category": "product_version_range",
"name": "Service Mesh \u003c2.0.9",
"product": {
"name": "Red Hat OpenShift Service Mesh \u003c2.0.9",
"product_id": "T022581"
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28851",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2020-28851"
},
{
"cve": "CVE-2020-28852",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2020-28852"
},
{
"cve": "CVE-2021-29482",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-29482"
},
{
"cve": "CVE-2021-29923",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-3121",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-3121"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-3749",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-3749"
},
{
"cve": "CVE-2021-43565",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-43824",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-43824"
},
{
"cve": "CVE-2021-43825",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-43825"
},
{
"cve": "CVE-2021-43826",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2021-43826"
},
{
"cve": "CVE-2022-21654",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2022-21654"
},
{
"cve": "CVE-2022-21655",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2022-21655"
},
{
"cve": "CVE-2022-23606",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2022-23606"
},
{
"cve": "CVE-2022-23635",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2022-23635"
},
{
"cve": "CVE-2022-24726",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T012167",
"T004914",
"T022509"
]
},
"release_date": "2022-04-07T22:00:00.000+00:00",
"title": "CVE-2022-24726"
}
]
}
WID-SEC-W-2022-0941
Vulnerability from csaf_certbund - Published: 2021-08-09 22:00 - Updated: 2024-12-18 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um die Integrit\u00e4t und die Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0941 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0941.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0941 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0941"
},
{
"category": "external",
"summary": "RedHat Security Advisory RHSA-2021:2984 vom 2021-08-09",
"url": "https://access.redhat.com/errata/RHSA-2021:2984"
},
{
"category": "external",
"summary": "RedHat Security Advisory RHSA-2021:2983 vom 2021-08-10",
"url": "https://access.redhat.com/errata/RHSA-2021:2983"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3009 vom 2021-08-12",
"url": "https://access.redhat.com/errata/RHSA-2021:3009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3146 vom 2021-08-12",
"url": "https://access.redhat.com/errata/RHSA-2021:3146"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3229 vom 2021-08-20",
"url": "https://access.redhat.com/errata/RHSA-2021:3229"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31",
"url": "https://access.redhat.com/errata/RHSA-2021:3361"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3248 vom 2021-08-31",
"url": "https://access.redhat.com/errata/RHSA-2021:3248"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3431 vom 2021-09-07",
"url": "https://access.redhat.com/errata/RHSA-2021:3431"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08",
"url": "https://access.redhat.com/errata/RHSA-2021:3454"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3487 vom 2021-09-15",
"url": "https://access.redhat.com/errata/RHSA-2021:3487"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3556 vom 2021-09-17",
"url": "https://access.redhat.com/errata/RHSA-2021:3556"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3555 vom 2021-09-16",
"url": "https://access.redhat.com/errata/RHSA-2021:3555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21",
"url": "https://access.redhat.com/errata/RHSA-2021:3598"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3585 vom 2021-09-21",
"url": "https://access.redhat.com/errata/RHSA-2021:3585"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-3585 vom 2021-09-22",
"url": "http://linux.oracle.com/errata/ELSA-2021-3585.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3759 vom 2021-10-18",
"url": "https://access.redhat.com/errata/RHSA-2021:3759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3820 vom 2021-10-19",
"url": "https://access.redhat.com/errata/RHSA-2021:3820"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4104 vom 2021-11-02",
"url": "https://access.redhat.com/errata/RHSA-2021:4104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4156 vom 2021-11-10",
"url": "https://access.redhat.com/errata/RHSA-2021:4156"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4226 vom 2021-11-09",
"url": "https://access.redhat.com/errata/RHSA-2021:4226"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4725 vom 2021-11-17",
"url": "https://access.redhat.com/errata/RHSA-2021:4725"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4722 vom 2021-11-17",
"url": "https://access.redhat.com/errata/RHSA-2021:4722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4902 vom 2021-12-01",
"url": "https://access.redhat.com/errata/RHSA-2021:4902"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4914 vom 2021-12-02",
"url": "https://access.redhat.com/errata/RHSA-2021:4914"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4910 vom 2021-12-02",
"url": "https://access.redhat.com/errata/RHSA-2021:4910"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:5072 vom 2021-12-10",
"url": "https://access.redhat.com/errata/RHSA-2021:5072"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:5086 vom 2021-12-13",
"url": "https://access.redhat.com/errata/RHSA-2021:5086"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:5085 vom 2021-12-13",
"url": "https://access.redhat.com/errata/RHSA-2021:5085"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0191 vom 2022-01-20",
"url": "https://access.redhat.com/errata/RHSA-2022:0191"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0237 vom 2022-01-24",
"url": "https://access.redhat.com/errata/RHSA-2022:0237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0260 vom 2022-01-25",
"url": "https://access.redhat.com/errata/RHSA-2022:0260"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27",
"url": "https://access.redhat.com/errata/RHSA-2022:0318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0432 vom 2022-02-03",
"url": "https://access.redhat.com/errata/RHSA-2022:0432"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0431 vom 2022-02-03",
"url": "https://access.redhat.com/errata/RHSA-2022:0431"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04",
"url": "https://access.redhat.com/errata/RHSA-2022:0434"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0557 vom 2022-02-23",
"url": "https://access.redhat.com/errata/RHSA-2022:0557"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0561 vom 2022-02-23",
"url": "https://access.redhat.com/errata/RHSA-2022:0561"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0947 vom 2022-03-16",
"url": "https://access.redhat.com/errata/RHSA-2022:0947"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0997 vom 2022-03-24",
"url": "https://access.redhat.com/errata/RHSA-2022:0997"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0998 vom 2022-03-24",
"url": "https://access.redhat.com/errata/RHSA-2022:0998"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0989 vom 2022-03-24",
"url": "https://access.redhat.com/errata/RHSA-2022:0989"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0988 vom 2022-03-24",
"url": "https://access.redhat.com/errata/RHSA-2022:0988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0577 vom 2022-03-28",
"url": "https://access.redhat.com/errata/RHSA-2022:0577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1276 vom 2022-04-08",
"url": "https://access.redhat.com/errata/RHSA-2022:1276"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1329 vom 2022-04-12",
"url": "https://access.redhat.com/errata/RHSA-2022:1329"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1372 vom 2022-04-14",
"url": "https://access.redhat.com/errata/RHSA-2022:1372"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1402 vom 2022-04-19",
"url": "https://access.redhat.com/errata/RHSA-2022:1402"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2022-1830 vom 2022-08-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1830.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202208-02 vom 2022-08-09",
"url": "https://security.gentoo.org/glsa/202208-02"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7954 vom 2022-11-15",
"url": "https://access.redhat.com/errata/RHSA-2022:7954"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7955 vom 2022-11-15",
"url": "https://access.redhat.com/errata/RHSA-2022:7955"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:8008 vom 2022-11-15",
"url": "https://access.redhat.com/errata/RHSA-2022:8008"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-7955 vom 2022-11-22",
"url": "https://linux.oracle.com/errata/ELSA-2022-7955.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2586 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2586"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10289 vom 2024-11-26",
"url": "https://access.redhat.com/errata/RHSA-2024:10289"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10289 vom 2024-11-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-10289.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10289 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10289"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-18T23:00:00.000+00:00",
"generator": {
"date": "2024-12-19T09:19:52.936+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2022-0941",
"initial_release_date": "2021-08-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-08-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-08-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-11T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-31T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-06T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-07T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-14T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-16T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-20T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-22T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-10-18T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-10-19T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-11-02T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-11-17T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-12-01T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-12-02T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-12-09T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-12-13T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-19T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-24T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-25T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-27T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-02-03T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-02-23T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-03-16T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-03-23T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-03-24T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-03-28T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-07T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-12T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-13T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-19T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-08-08T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-08-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2022-11-15T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-11-23T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "44"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.8.4",
"product": {
"name": "Red Hat OpenShift \u003c4.8.4",
"product_id": "T020080"
}
},
{
"category": "product_version",
"name": "4.8.4",
"product": {
"name": "Red Hat OpenShift 4.8.4",
"product_id": "T020080-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.8.4"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"67646",
"T020080",
"398363",
"T012167",
"T004914",
"T032255"
]
},
"release_date": "2021-08-09T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"67646",
"T020080",
"398363",
"T012167",
"T004914",
"T032255"
]
},
"release_date": "2021-08-09T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"67646",
"T020080",
"398363",
"T012167",
"T004914",
"T032255"
]
},
"release_date": "2021-08-09T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33198",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"67646",
"T020080",
"398363",
"T012167",
"T004914",
"T032255"
]
},
"release_date": "2021-08-09T22:00:00.000+00:00",
"title": "CVE-2021-33198"
}
]
}
WID-SEC-W-2022-1335
Vulnerability from csaf_certbund - Published: 2022-09-07 22:00 - Updated: 2023-05-18 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1335 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1335 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-05-18T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:34:44.234+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-1335",
"initial_release_date": "2022-09-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-09-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-04-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server 7",
"product": {
"name": "Xerox FreeFlow Print Server 7",
"product_id": "T000872",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:7"
}
}
},
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server 9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
},
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2019-19906",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2019-19906"
},
{
"cve": "CVE-2020-0499",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2020-0499"
},
{
"cve": "CVE-2020-25717",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2020-25717"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2021-0561",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-0561"
},
{
"cve": "CVE-2021-21708",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-21708"
},
{
"cve": "CVE-2021-22946",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-25220",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-25220"
},
{
"cve": "CVE-2021-29923",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-30809",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30809"
},
{
"cve": "CVE-2021-30818",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30818"
},
{
"cve": "CVE-2021-30823",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30823"
},
{
"cve": "CVE-2021-30836",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30836"
},
{
"cve": "CVE-2021-30884",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30884"
},
{
"cve": "CVE-2021-30887",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30887"
},
{
"cve": "CVE-2021-30888",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30888"
},
{
"cve": "CVE-2021-30889",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30889"
},
{
"cve": "CVE-2021-30890",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30890"
},
{
"cve": "CVE-2021-30897",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30897"
},
{
"cve": "CVE-2021-30934",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30934"
},
{
"cve": "CVE-2021-30936",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30936"
},
{
"cve": "CVE-2021-30951",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30951"
},
{
"cve": "CVE-2021-30952",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30952"
},
{
"cve": "CVE-2021-30953",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30953"
},
{
"cve": "CVE-2021-30954",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30954"
},
{
"cve": "CVE-2021-30984",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-30984"
},
{
"cve": "CVE-2021-3448",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-3448"
},
{
"cve": "CVE-2021-34558",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-34558"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-4115",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4115"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-4173",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4173"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-41772",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-41772"
},
{
"cve": "CVE-2021-4187",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4187"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4217",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-4217"
},
{
"cve": "CVE-2021-43519",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-43519"
},
{
"cve": "CVE-2021-43566",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-43566"
},
{
"cve": "CVE-2021-44142",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-44142"
},
{
"cve": "CVE-2021-45444",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-45444"
},
{
"cve": "CVE-2021-45481",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-45481"
},
{
"cve": "CVE-2021-45482",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-45482"
},
{
"cve": "CVE-2021-45483",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-45483"
},
{
"cve": "CVE-2021-45960",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-45960"
},
{
"cve": "CVE-2021-46143",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2021-46143"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0156",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0156"
},
{
"cve": "CVE-2022-0158",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0158"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0336",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0336"
},
{
"cve": "CVE-2022-0391",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0391"
},
{
"cve": "CVE-2022-0408",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0408"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0417",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0417"
},
{
"cve": "CVE-2022-0443",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0443"
},
{
"cve": "CVE-2022-0554",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0554"
},
{
"cve": "CVE-2022-0566",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0566"
},
{
"cve": "CVE-2022-0572",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0572"
},
{
"cve": "CVE-2022-0629",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0629"
},
{
"cve": "CVE-2022-0685",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0685"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0714",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0714"
},
{
"cve": "CVE-2022-0729",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0729"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1097",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-1097"
},
{
"cve": "CVE-2022-1196",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-1196"
},
{
"cve": "CVE-2022-1197",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-1197"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1520",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-1520"
},
{
"cve": "CVE-2022-1834",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-1834"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21291",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21291"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21349",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21349"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21426",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21426"
},
{
"cve": "CVE-2022-21434",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21434"
},
{
"cve": "CVE-2022-21443",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21443"
},
{
"cve": "CVE-2022-21449",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21449"
},
{
"cve": "CVE-2022-21476",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21476"
},
{
"cve": "CVE-2022-21493",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21493"
},
{
"cve": "CVE-2022-21494",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21494"
},
{
"cve": "CVE-2022-21496",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21496"
},
{
"cve": "CVE-2022-21514",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21514"
},
{
"cve": "CVE-2022-21524",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21524"
},
{
"cve": "CVE-2022-21533",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21533"
},
{
"cve": "CVE-2022-21712",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21712"
},
{
"cve": "CVE-2022-21716",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-21716"
},
{
"cve": "CVE-2022-22589",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22589"
},
{
"cve": "CVE-2022-22590",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22590"
},
{
"cve": "CVE-2022-22592",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22592"
},
{
"cve": "CVE-2022-22620",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22620"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22818",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22818"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-22825",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22825"
},
{
"cve": "CVE-2022-22826",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22826"
},
{
"cve": "CVE-2022-22827",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-22827"
},
{
"cve": "CVE-2022-23308",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-23806",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23806"
},
{
"cve": "CVE-2022-23833",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23833"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-23990",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-23990"
},
{
"cve": "CVE-2022-24130",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-24130"
},
{
"cve": "CVE-2022-24407",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-24407"
},
{
"cve": "CVE-2022-24675",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24713",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-24713"
},
{
"cve": "CVE-2022-24801",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-24801"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-25313",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-25313"
},
{
"cve": "CVE-2022-25314",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-25314"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-25762",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-25762"
},
{
"cve": "CVE-2022-26381",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26381"
},
{
"cve": "CVE-2022-26383",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26383"
},
{
"cve": "CVE-2022-26384",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26384"
},
{
"cve": "CVE-2022-26386",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26386"
},
{
"cve": "CVE-2022-26387",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26387"
},
{
"cve": "CVE-2022-26485",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26485"
},
{
"cve": "CVE-2022-26486",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-26486"
},
{
"cve": "CVE-2022-28281",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28281"
},
{
"cve": "CVE-2022-28282",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28282"
},
{
"cve": "CVE-2022-28285",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28285"
},
{
"cve": "CVE-2022-28286",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28286"
},
{
"cve": "CVE-2022-28289",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28289"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-28346",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28346"
},
{
"cve": "CVE-2022-28347",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-28347"
},
{
"cve": "CVE-2022-29824",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29824"
},
{
"cve": "CVE-2022-29909",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29909"
},
{
"cve": "CVE-2022-29911",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29911"
},
{
"cve": "CVE-2022-29912",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29912"
},
{
"cve": "CVE-2022-29913",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29913"
},
{
"cve": "CVE-2022-29914",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29914"
},
{
"cve": "CVE-2022-29916",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29916"
},
{
"cve": "CVE-2022-29917",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-29917"
},
{
"cve": "CVE-2022-31736",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31736"
},
{
"cve": "CVE-2022-31737",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31737"
},
{
"cve": "CVE-2022-31738",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31738"
},
{
"cve": "CVE-2022-31739",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31739"
},
{
"cve": "CVE-2022-3174",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-3174"
},
{
"cve": "CVE-2022-31740",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31740"
},
{
"cve": "CVE-2022-31741",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31741"
},
{
"cve": "CVE-2022-31742",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31742"
},
{
"cve": "CVE-2022-31747",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-31747"
},
{
"cve": "CVE-2022-4187",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T000872",
"T015632",
"T002977"
]
},
"release_date": "2022-09-07T22:00:00.000+00:00",
"title": "CVE-2022-4187"
}
]
}
WID-SEC-W-2023-2229
Vulnerability from csaf_certbund - Published: 2023-08-30 22:00 - Updated: 2024-08-12 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2229 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2229 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0801"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0802"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0803"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0804"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0805"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0806"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0807"
},
{
"category": "external",
"summary": "Splunk Security Advisory vom 2023-08-30",
"url": "https://advisory.splunk.com//advisories/SVD-2023-0808"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0801"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-08-12T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:57:53.670+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2229",
"initial_release_date": "2023-08-30T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-08-30T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Splunk Splunk Enterprise",
"product": {
"name": "Splunk Splunk Enterprise",
"product_id": "T008911",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.1",
"product_id": "T029634"
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.6",
"product_id": "T029635"
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.12",
"product": {
"name": "Splunk Splunk Enterprise \u003c8.2.12",
"product_id": "T029636"
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-7489",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2013-7489"
},
{
"cve": "CVE-2018-10237",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-10237"
},
{
"cve": "CVE-2018-20225",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2018-20225"
},
{
"cve": "CVE-2019-20454",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20454"
},
{
"cve": "CVE-2019-20838",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2019-20838"
},
{
"cve": "CVE-2020-14155",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-14155"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28851",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-28851"
},
{
"cve": "CVE-2020-29652",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-29652"
},
{
"cve": "CVE-2020-8169",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2021-20066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-20066"
},
{
"cve": "CVE-2021-22569",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22569"
},
{
"cve": "CVE-2021-22876",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22890",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22922",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22945",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23343",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23343"
},
{
"cve": "CVE-2021-23382",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-23382"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-27919",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-27919"
},
{
"cve": "CVE-2021-29060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29060"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-29923",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-29923"
},
{
"cve": "CVE-2021-31525",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31525"
},
{
"cve": "CVE-2021-31566",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-31566"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33198",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-33198"
},
{
"cve": "CVE-2021-34558",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-34558"
},
{
"cve": "CVE-2021-3520",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-3572",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3572"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36976",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-36976"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-38561",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-38561"
},
{
"cve": "CVE-2021-39293",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-39293"
},
{
"cve": "CVE-2021-41182",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41182"
},
{
"cve": "CVE-2021-41183",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41183"
},
{
"cve": "CVE-2021-41184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41184"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-41772",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-41772"
},
{
"cve": "CVE-2021-43565",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44717",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2021-44717"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1941",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1941"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-22576",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2022-2309",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2309"
},
{
"cve": "CVE-2022-23491",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23491"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-23806",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-23806"
},
{
"cve": "CVE-2022-24675",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24921",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24921"
},
{
"cve": "CVE-2022-24999",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-24999"
},
{
"cve": "CVE-2022-25881",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-25881"
},
{
"cve": "CVE-2022-27191",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27536"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-27774",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-27775",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-27776",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-27778",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27778"
},
{
"cve": "CVE-2022-27779",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27779"
},
{
"cve": "CVE-2022-27780",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27780"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2879",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29804",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-29804"
},
{
"cve": "CVE-2022-30115",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30629",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30629"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30634",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30634"
},
{
"cve": "CVE-2022-30635",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-31129",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-3171",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32189",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32205",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-33987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-33987"
},
{
"cve": "CVE-2022-3509",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3509"
},
{
"cve": "CVE-2022-3510",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3510"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-35260",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35260"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36227",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-36227"
},
{
"cve": "CVE-2022-37599",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37599"
},
{
"cve": "CVE-2022-37601",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37601"
},
{
"cve": "CVE-2022-37603",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-37603"
},
{
"cve": "CVE-2022-38900",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-38900"
},
{
"cve": "CVE-2022-40023",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40023"
},
{
"cve": "CVE-2022-40897",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-41715",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41716",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41716"
},
{
"cve": "CVE-2022-41720",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-41722",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42915"
},
{
"cve": "CVE-2022-42916",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-43551",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-46175",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2023-23914",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-24539",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24539"
},
{
"cve": "CVE-2023-24540",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-24540"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27537",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27537"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-29400",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29400"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29403",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29403"
},
{
"cve": "CVE-2023-29404",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29405",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-29405"
},
{
"cve": "CVE-2023-40592",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40592"
},
{
"cve": "CVE-2023-40593",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40593"
},
{
"cve": "CVE-2023-40594",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40594"
},
{
"cve": "CVE-2023-40595",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40595"
},
{
"cve": "CVE-2023-40596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40596"
},
{
"cve": "CVE-2023-40597",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40597"
},
{
"cve": "CVE-2023-40598",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T033720",
"T002207",
"T008911",
"T033718",
"T033705",
"T004914"
]
},
"release_date": "2023-08-30T22:00:00.000+00:00",
"title": "CVE-2023-40598"
}
]
}
GSD-2021-29923
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-29923",
"description": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.",
"id": "GSD-2021-29923",
"references": [
"https://www.suse.com/security/cve/CVE-2021-29923.html",
"https://access.redhat.com/errata/RHSA-2022:0561",
"https://access.redhat.com/errata/RHSA-2022:0557",
"https://access.redhat.com/errata/RHSA-2022:0434",
"https://access.redhat.com/errata/RHSA-2022:0432",
"https://access.redhat.com/errata/RHSA-2022:0431",
"https://access.redhat.com/errata/RHSA-2022:0318",
"https://access.redhat.com/errata/RHSA-2022:0260",
"https://access.redhat.com/errata/RHSA-2022:0237",
"https://access.redhat.com/errata/RHSA-2021:4914",
"https://access.redhat.com/errata/RHSA-2021:4910",
"https://access.redhat.com/errata/RHSA-2021:4902",
"https://access.redhat.com/errata/RHSA-2021:4725",
"https://access.redhat.com/errata/RHSA-2021:4722",
"https://access.redhat.com/errata/RHSA-2021:3585",
"https://access.redhat.com/errata/RHSA-2021:3431",
"https://security.archlinux.org/CVE-2021-29923",
"https://access.redhat.com/errata/RHSA-2022:0577",
"https://access.redhat.com/errata/RHSA-2022:0947",
"https://access.redhat.com/errata/RHSA-2022:0988",
"https://access.redhat.com/errata/RHSA-2022:0989",
"https://access.redhat.com/errata/RHSA-2022:0997",
"https://access.redhat.com/errata/RHSA-2022:0998",
"https://access.redhat.com/errata/RHSA-2022:1276",
"https://access.redhat.com/errata/RHSA-2022:1372",
"https://linux.oracle.com/cve/CVE-2021-29923.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-29923"
],
"details": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.",
"id": "GSD-2021-29923",
"modified": "2023-12-13T01:23:36.622313Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29923",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://golang.org/pkg/net/#ParseCIDR",
"refsource": "MISC",
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis",
"refsource": "MISC",
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"name": "https://github.com/golang/go/issues/43389",
"refsource": "MISC",
"url": "https://github.com/golang/go/issues/43389"
},
{
"name": "https://github.com/golang/go/issues/30999",
"refsource": "MISC",
"url": "https://github.com/golang/go/issues/30999"
},
{
"name": "https://go-review.googlesource.com/c/go/+/325829/",
"refsource": "MISC",
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md",
"refsource": "MISC",
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"name": "FEDORA-2022-17d004ed71",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"name": "GLSA-202208-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.17",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "21.1.1.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29923"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/golang/go/issues/43389",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/43389"
},
{
"name": "https://github.com/golang/go/issues/30999",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/30999"
},
{
"name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"name": "https://golang.org/pkg/net/#ParseCIDR",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"name": "https://go-review.googlesource.com/c/go/+/325829/",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "FEDORA-2022-17d004ed71",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"name": "GLSA-202208-02",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-09-14T21:11Z",
"publishedDate": "2021-08-07T17:15Z"
}
}
}
MSRC_CVE-2021-29923
Vulnerability from csaf_microsoft - Published: 2021-08-02 00:00 - Updated: 2024-09-11 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-29923 Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP addresses because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-29923.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP addresses because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.",
"tracking": {
"current_release_date": "2024-09-11T00:00:00.000Z",
"generator": {
"date": "2025-10-19T22:09:27.532Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-29923",
"initial_release_date": "2021-08-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-08-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
}
],
"status": "final",
"version": "12"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 golang 1.16.7-1",
"product": {
"name": "\u003ccm1 golang 1.16.7-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cm1 golang 1.16.7-1",
"product": {
"name": "cm1 golang 1.16.7-1",
"product_id": "19007"
}
}
],
"category": "product_name",
"name": "golang"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 python-tensorboard 2.16.2-2",
"product": {
"name": "\u003cazl3 python-tensorboard 2.16.2-2",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 python-tensorboard 2.16.2-2",
"product": {
"name": "azl3 python-tensorboard 2.16.2-2",
"product_id": "17021"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python-tensorboard 2.11.0-3",
"product": {
"name": "\u003cazl3 python-tensorboard 2.11.0-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 python-tensorboard 2.11.0-3",
"product": {
"name": "azl3 python-tensorboard 2.11.0-3",
"product_id": "19696"
}
}
],
"category": "product_name",
"name": "python-tensorboard"
},
{
"category": "product_name",
"name": "azl3 golang 1.24.3-1",
"product": {
"name": "azl3 golang 1.24.3-1",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 golang 1.16.7-1 as a component of CBL Mariner 1.0",
"product_id": "16820-3"
},
"product_reference": "3",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 golang 1.16.7-1 as a component of CBL Mariner 1.0",
"product_id": "19007-16820"
},
"product_reference": "19007",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
"product_id": "17021-17084"
},
"product_reference": "17021",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.24.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
"product_id": "19696-17084"
},
"product_reference": "19696",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29923",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19007-16820",
"17021-17084",
"19696-17084"
],
"known_affected": [
"16820-3",
"17084-4",
"17084-2"
],
"known_not_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-29923 Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP addresses because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-29923.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-18T00:00:00.000Z",
"details": "1.16.7-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2021-08-18T00:00:00.000Z",
"details": "2.16.2-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-4",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"16820-3",
"17084-4",
"17084-2"
]
}
],
"title": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP addresses because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR."
}
]
}
FKIE_CVE-2021-29923
Vulnerability from fkie_nvd - Published: 2021-08-07 17:15 - Updated: 2024-11-21 06:01| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis | Third Party Advisory | |
| cve@mitre.org | https://github.com/golang/go/issues/30999 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://github.com/golang/go/issues/43389 | Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md | Exploit, Third Party Advisory | |
| cve@mitre.org | https://go-review.googlesource.com/c/go/+/325829/ | Patch, Third Party Advisory | |
| cve@mitre.org | https://golang.org/pkg/net/#ParseCIDR | Vendor Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/ | ||
| cve@mitre.org | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory | |
| cve@mitre.org | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/golang/go/issues/30999 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/golang/go/issues/43389 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://go-review.googlesource.com/c/go/+/325829/ | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://golang.org/pkg/net/#ParseCIDR | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| golang | go | * | |
| oracle | timesten_in-memory_database | * | |
| fedoraproject | fedora | 36 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D39D5C21-8281-429F-AC33-CE39821CA3EC",
"versionEndExcluding": "1.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1",
"versionEndExcluding": "21.1.1.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR."
},
{
"lang": "es",
"value": "Go versiones anteriores a 1.17, no considera apropiadamente los caracteres cero extra\u00f1os al principio de un octeto de direcci\u00f3n IP, lo que (en algunas situaciones) permite a atacantes omitir el control de acceso que es basado en las direcciones IP, debido a una interpretaci\u00f3n octal inesperada. Esto afecta a net.ParseIP y net.ParseCIDR"
}
],
"id": "CVE-2021-29923",
"lastModified": "2024-11-21T06:01:59.570",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-07T17:15:07.067",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/30999"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/43389"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-02"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/30999"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/43389"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://go-review.googlesource.com/c/go/+/325829/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-38H6-VXP4-QXVM
Vulnerability from github – Published: 2022-05-24 19:10 – Updated: 2022-05-24 19:10Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
{
"affected": [],
"aliases": [
"CVE-2021-29923"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-08-07T17:15:00Z",
"severity": "HIGH"
},
"details": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.",
"id": "GHSA-38h6-vxp4-qxvm",
"modified": "2022-05-24T19:10:21Z",
"published": "2022-05-24T19:10:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923"
},
{
"type": "WEB",
"url": "https://github.com/golang/go/issues/30999"
},
{
"type": "WEB",
"url": "https://github.com/golang/go/issues/43389"
},
{
"type": "WEB",
"url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis"
},
{
"type": "WEB",
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md"
},
{
"type": "WEB",
"url": "https://go-review.googlesource.com/c/go/+/325829"
},
{
"type": "WEB",
"url": "https://golang.org/pkg/net/#ParseCIDR"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-02"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.